CVE-2024-45773: Use After Free (CWE-416) in Facebook Facebook Thrift
A use-after-free vulnerability involving upgradeToRocket requests can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2024.09.09.00.
AI Analysis
Technical Summary
CVE-2024-45773 is a use-after-free vulnerability classified under CWE-416 affecting Facebook Thrift, a software framework used for scalable cross-language services development. The vulnerability arises specifically when handling upgradeToRocket requests, which improperly manage memory, leading to use-after-free conditions. This flaw can cause the affected application to crash or, more critically, allow an attacker to execute arbitrary code remotely. The vulnerability affects all versions of Facebook Thrift prior to v2024.09.09.00. Exploitation requires network access and low privileges but does not require user interaction, increasing the risk of automated attacks. The CVSS v3.1 score of 7.5 indicates a high-severity issue with network attack vector, high impact on confidentiality, integrity, and availability, and a requirement for low privileges but high attack complexity. No public exploits or active exploitation have been reported yet, but the potential for remote code execution makes this a significant threat. Facebook Thrift is widely used internally at Facebook and by other organizations for RPC communication, meaning that vulnerable deployments could be targeted to disrupt services or gain unauthorized access. The lack of available patches at the time of reporting necessitates immediate attention to upgrade once available and implement interim mitigations.
Potential Impact
The vulnerability poses a high risk to organizations using Facebook Thrift, as it can lead to remote code execution, allowing attackers to compromise affected systems fully. This can result in unauthorized data access, manipulation, service disruption, or lateral movement within networks. The use-after-free condition can also cause application crashes, leading to denial of service. Given Facebook Thrift's role in enabling scalable service communication, exploitation could impact critical backend infrastructure, affecting service availability and data integrity. Organizations relying on Facebook Thrift for internal or external services may face operational disruptions and potential data breaches. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits rapidly. The vulnerability's network attack vector and no user interaction required make it suitable for remote exploitation, increasing the scope and ease of attack.
Mitigation Recommendations
Organizations should immediately plan to upgrade Facebook Thrift to version 2024.09.09.00 or later once the patch is available. Until then, restrict network access to services using Facebook Thrift, especially limiting exposure of upgradeToRocket request handling endpoints to trusted networks only. Employ network segmentation and firewall rules to minimize attack surface. Monitor logs and network traffic for unusual upgradeToRocket request patterns or crashes indicative of exploitation attempts. Conduct thorough code audits and memory management reviews in custom implementations of Thrift to identify similar use-after-free risks. Implement runtime protections such as memory safety tools (e.g., AddressSanitizer) in development and testing environments to detect use-after-free conditions early. Maintain up-to-date intrusion detection and prevention systems with signatures for this vulnerability once available. Finally, ensure incident response plans include procedures for rapid containment and remediation of memory corruption exploits.
Affected Countries
United States, Canada, United Kingdom, Germany, France, India, Australia, Japan, South Korea, Brazil
CVE-2024-45773: Use After Free (CWE-416) in Facebook Facebook Thrift
Description
A use-after-free vulnerability involving upgradeToRocket requests can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2024.09.09.00.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45773 is a use-after-free vulnerability classified under CWE-416 affecting Facebook Thrift, a software framework used for scalable cross-language services development. The vulnerability arises specifically when handling upgradeToRocket requests, which improperly manage memory, leading to use-after-free conditions. This flaw can cause the affected application to crash or, more critically, allow an attacker to execute arbitrary code remotely. The vulnerability affects all versions of Facebook Thrift prior to v2024.09.09.00. Exploitation requires network access and low privileges but does not require user interaction, increasing the risk of automated attacks. The CVSS v3.1 score of 7.5 indicates a high-severity issue with network attack vector, high impact on confidentiality, integrity, and availability, and a requirement for low privileges but high attack complexity. No public exploits or active exploitation have been reported yet, but the potential for remote code execution makes this a significant threat. Facebook Thrift is widely used internally at Facebook and by other organizations for RPC communication, meaning that vulnerable deployments could be targeted to disrupt services or gain unauthorized access. The lack of available patches at the time of reporting necessitates immediate attention to upgrade once available and implement interim mitigations.
Potential Impact
The vulnerability poses a high risk to organizations using Facebook Thrift, as it can lead to remote code execution, allowing attackers to compromise affected systems fully. This can result in unauthorized data access, manipulation, service disruption, or lateral movement within networks. The use-after-free condition can also cause application crashes, leading to denial of service. Given Facebook Thrift's role in enabling scalable service communication, exploitation could impact critical backend infrastructure, affecting service availability and data integrity. Organizations relying on Facebook Thrift for internal or external services may face operational disruptions and potential data breaches. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits rapidly. The vulnerability's network attack vector and no user interaction required make it suitable for remote exploitation, increasing the scope and ease of attack.
Mitigation Recommendations
Organizations should immediately plan to upgrade Facebook Thrift to version 2024.09.09.00 or later once the patch is available. Until then, restrict network access to services using Facebook Thrift, especially limiting exposure of upgradeToRocket request handling endpoints to trusted networks only. Employ network segmentation and firewall rules to minimize attack surface. Monitor logs and network traffic for unusual upgradeToRocket request patterns or crashes indicative of exploitation attempts. Conduct thorough code audits and memory management reviews in custom implementations of Thrift to identify similar use-after-free risks. Implement runtime protections such as memory safety tools (e.g., AddressSanitizer) in development and testing environments to detect use-after-free conditions early. Maintain up-to-date intrusion detection and prevention systems with signatures for this vulnerability once available. Finally, ensure incident response plans include procedures for rapid containment and remediation of memory corruption exploits.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Date Reserved
- 2024-09-07T13:20:18.820Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cf1b7ef31ef0b56a60f
Added to database: 2/25/2026, 9:43:13 PM
Last enriched: 2/26/2026, 8:20:12 AM
Last updated: 4/11/2026, 5:57:14 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.