Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45863: NULL Pointer Dereference (CWE-476) in Facebook Facebook Thrift

0
Medium
VulnerabilityCVE-2024-45863cvecve-2024-45863cwe-476
Published: Fri Sep 27 2024 (09/27/2024, 13:50:29 UTC)
Source: CVE Database V5
Vendor/Project: Facebook
Product: Facebook Thrift

Description

A null-dereference vulnerability involving parsing requests specifying invalid protocols can cause the application to crash or potentially result in other undesirable effects. This issue affects Facebook Thrift from v2024.09.09.00 until v2024.09.23.00.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:06:26 UTC

Technical Analysis

CVE-2024-45863 is a null pointer dereference vulnerability classified under CWE-476 found in Facebook Thrift, a widely used RPC (Remote Procedure Call) framework developed by Facebook. The vulnerability arises during the parsing of requests that specify invalid or unsupported protocols. When such malformed requests are processed, the application attempts to dereference a null pointer, leading to a crash or potentially other unintended behaviors affecting the application's availability. This issue affects Facebook Thrift versions starting from v2024.09.09.00 up to v2024.09.23.00. The vulnerability requires an attacker to send specially crafted network requests, with low privileges and no user interaction, but the attack complexity is considered high due to the need to craft precise invalid protocol requests. The impact is primarily a denial-of-service (DoS) condition, as the application may crash, disrupting service availability. There is no indication that confidentiality or integrity of data is compromised. No public exploits or active exploitation campaigns have been reported to date. The vulnerability was reserved on September 10, 2024, and published on September 27, 2024. The CVSS v3.1 score is 5.3, reflecting medium severity with network attack vector, high attack complexity, low privileges required, no user interaction, and impact limited to availability. Facebook Thrift is used in various internal and external Facebook services and potentially by other organizations leveraging this RPC framework, making the vulnerability relevant to distributed systems relying on it.

Potential Impact

The primary impact of CVE-2024-45863 is on the availability of services using the affected Facebook Thrift versions. An attacker can cause the application to crash by sending malformed requests with invalid protocol specifications, leading to denial-of-service conditions. This can disrupt critical services, degrade user experience, and potentially cause cascading failures in distributed systems dependent on Facebook Thrift. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modifications are not expected. However, service outages can have significant operational and reputational consequences, especially for organizations relying on Facebook Thrift for internal or customer-facing applications. The medium severity and high attack complexity reduce the likelihood of widespread exploitation, but targeted attacks against vulnerable deployments remain a concern. Organizations with high availability requirements or those operating in sensitive sectors should prioritize remediation to avoid potential service disruptions.

Mitigation Recommendations

To mitigate CVE-2024-45863, organizations should promptly upgrade Facebook Thrift to a version later than v2024.09.23.00 once a patched release is available. In the interim, network-level controls can reduce exposure by filtering or blocking malformed or suspicious protocol requests targeting Facebook Thrift services. Implement strict input validation and protocol compliance checks at the application or proxy layer to detect and reject invalid requests before they reach the vulnerable component. Employ rate limiting and anomaly detection to identify and mitigate potential denial-of-service attempts. Monitor logs and telemetry for unusual crash patterns or malformed request attempts indicative of exploitation attempts. Where possible, isolate Facebook Thrift services behind firewalls or VPNs to restrict access to trusted sources. Conduct thorough testing of updated versions in staging environments to ensure stability and compatibility before production deployment. Maintain an incident response plan to quickly address any service disruptions caused by exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2024-09-10T18:21:24.359Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf1b7ef31ef0b56a66a

Added to database: 2/25/2026, 9:43:13 PM

Last enriched: 2/28/2026, 7:06:26 AM

Last updated: 4/12/2026, 6:10:29 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses