CVE-2024-46292: n/a
A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
AI Analysis
Technical Summary
CVE-2024-46292 identifies a buffer overflow vulnerability in ModSecurity version 3.0.12, a widely used open-source web application firewall (WAF). The flaw arises when a specially crafted input is inserted into the 'name' parameter, potentially causing a Denial of Service (DoS) by crashing or destabilizing the ModSecurity process. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), indicating that improper handling of input data leads to memory corruption. Exploitation requires sending malicious network traffic containing the crafted 'name' parameter, with no authentication or user interaction needed, making it remotely exploitable. However, the supplier disputes the vulnerability's reproducibility and highlights that exploitation depends on setting very large values for the SecRequestBodyNoFilesLimit configuration directive, which the product documentation states is not guaranteed to be supported. The CVSS 3.1 base score of 7.5 reflects a high severity due to the ease of remote exploitation and impact on availability, though confidentiality and integrity remain unaffected. No patches or known exploits have been reported at this time. The vulnerability's impact is limited to causing service disruption rather than data compromise. Organizations running ModSecurity 3.0.12, particularly with customized SecRequestBodyNoFilesLimit settings, should assess their risk and monitor for updates.
Potential Impact
The primary impact of CVE-2024-46292 is Denial of Service (DoS), which can disrupt web application firewall functionality and potentially expose protected web applications to attacks by disabling or destabilizing the WAF. This can lead to downtime, degraded service availability, and increased risk of exploitation of underlying web applications. Since ModSecurity is often deployed in front of critical web services, a successful DoS could affect business continuity and user trust. The vulnerability does not compromise confidentiality or integrity, limiting the scope to availability impacts. The ease of remote exploitation without authentication increases risk, especially in environments where large SecRequestBodyNoFilesLimit values are configured. However, the disputed reproducibility and lack of known exploits reduce immediate threat levels. Organizations relying on ModSecurity for security enforcement should consider this vulnerability a potential risk to service stability.
Mitigation Recommendations
1. Review and limit the SecRequestBodyNoFilesLimit configuration to values within documented supported ranges to reduce exposure to this vulnerability. 2. Monitor ModSecurity vendor advisories for patches or updates addressing this issue and apply them promptly once available. 3. Implement network-level protections such as rate limiting and input validation upstream to reduce the likelihood of receiving crafted malicious inputs targeting the 'name' parameter. 4. Employ redundancy and failover mechanisms for WAF infrastructure to maintain availability in case of DoS conditions. 5. Conduct regular security testing and fuzzing of ModSecurity configurations to detect potential stability issues. 6. Consider upgrading to later versions of ModSecurity if they address this or related vulnerabilities. 7. Monitor logs for unusual or malformed requests targeting the 'name' parameter to detect potential exploitation attempts early.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, India
CVE-2024-46292: n/a
Description
A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-46292 identifies a buffer overflow vulnerability in ModSecurity version 3.0.12, a widely used open-source web application firewall (WAF). The flaw arises when a specially crafted input is inserted into the 'name' parameter, potentially causing a Denial of Service (DoS) by crashing or destabilizing the ModSecurity process. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), indicating that improper handling of input data leads to memory corruption. Exploitation requires sending malicious network traffic containing the crafted 'name' parameter, with no authentication or user interaction needed, making it remotely exploitable. However, the supplier disputes the vulnerability's reproducibility and highlights that exploitation depends on setting very large values for the SecRequestBodyNoFilesLimit configuration directive, which the product documentation states is not guaranteed to be supported. The CVSS 3.1 base score of 7.5 reflects a high severity due to the ease of remote exploitation and impact on availability, though confidentiality and integrity remain unaffected. No patches or known exploits have been reported at this time. The vulnerability's impact is limited to causing service disruption rather than data compromise. Organizations running ModSecurity 3.0.12, particularly with customized SecRequestBodyNoFilesLimit settings, should assess their risk and monitor for updates.
Potential Impact
The primary impact of CVE-2024-46292 is Denial of Service (DoS), which can disrupt web application firewall functionality and potentially expose protected web applications to attacks by disabling or destabilizing the WAF. This can lead to downtime, degraded service availability, and increased risk of exploitation of underlying web applications. Since ModSecurity is often deployed in front of critical web services, a successful DoS could affect business continuity and user trust. The vulnerability does not compromise confidentiality or integrity, limiting the scope to availability impacts. The ease of remote exploitation without authentication increases risk, especially in environments where large SecRequestBodyNoFilesLimit values are configured. However, the disputed reproducibility and lack of known exploits reduce immediate threat levels. Organizations relying on ModSecurity for security enforcement should consider this vulnerability a potential risk to service stability.
Mitigation Recommendations
1. Review and limit the SecRequestBodyNoFilesLimit configuration to values within documented supported ranges to reduce exposure to this vulnerability. 2. Monitor ModSecurity vendor advisories for patches or updates addressing this issue and apply them promptly once available. 3. Implement network-level protections such as rate limiting and input validation upstream to reduce the likelihood of receiving crafted malicious inputs targeting the 'name' parameter. 4. Employ redundancy and failover mechanisms for WAF infrastructure to maintain availability in case of DoS conditions. 5. Conduct regular security testing and fuzzing of ModSecurity configurations to detect potential stability issues. 6. Consider upgrading to later versions of ModSecurity if they address this or related vulnerabilities. 7. Monitor logs for unusual or malformed requests targeting the 'name' parameter to detect potential exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cfab7ef31ef0b56aab2
Added to database: 2/25/2026, 9:43:22 PM
Last enriched: 2/28/2026, 7:18:15 AM
Last updated: 4/12/2026, 5:06:49 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.