CVE-2024-5971: Uncontrolled Recursion
A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.
AI Analysis
Technical Summary
CVE-2024-5971 is a vulnerability identified in the Undertow web server framework, specifically affecting its handling of HTTP chunked transfer encoding responses when operating under Java 17 with TLSv1.3 enabled. The issue arises because Undertow fails to send the terminating chunk sequence (0\r\n) after the response body has been flushed. Although the response headers and body are transmitted, the absence of this termination causes the client to wait indefinitely for the end of the response. This behavior leads to uncontrolled recursion in resource consumption on the server side, as the server continues to allocate resources waiting for the client to acknowledge the end of the response. The result is a denial of service (DoS) condition, where server resources are exhausted, potentially causing service outages or degraded performance. The vulnerability affects Undertow versions from 0 up to 2.3.0.Alpha1 and is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits have been reported in the wild yet, but the vulnerability's nature makes it a significant concern for environments relying on Undertow with Java 17 TLSv1.3 configurations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of web services that utilize Undertow with Java 17 TLSv1.3. Public-facing applications, APIs, and internal services relying on this stack could be targeted by attackers to cause denial of service, leading to service disruptions, potential loss of customer trust, and operational downtime. Industries such as finance, healthcare, and government, which often deploy Java-based web servers, may experience critical impacts due to the reliance on continuous availability and stringent service level agreements. Additionally, the uncontrolled resource consumption could lead to increased operational costs and complicate incident response efforts. Given the vulnerability does not affect confidentiality or integrity, the primary concern remains service availability and resilience against DoS attacks.
Mitigation Recommendations
Organizations should prioritize updating Undertow to a version that addresses CVE-2024-5971 once a patch is released. Until then, practical mitigations include: 1) Temporarily disabling TLSv1.3 if feasible, or reverting to Java versions or TLS configurations not affected by this issue; 2) Implementing rate limiting and connection throttling at the network or application layer to mitigate potential DoS attempts exploiting this flaw; 3) Monitoring server resource utilization and network traffic for abnormal patterns indicative of exploitation attempts; 4) Employing Web Application Firewalls (WAFs) to detect and block malformed or suspicious chunked transfer requests; 5) Reviewing and testing application behavior under chunked transfer scenarios to identify and mitigate any cascading failures; 6) Engaging with Undertow and Java community channels for updates and recommended patches. These steps go beyond generic advice by focusing on configuration adjustments and proactive monitoring tailored to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-5971: Uncontrolled Recursion
Description
A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.
AI-Powered Analysis
Technical Analysis
CVE-2024-5971 is a vulnerability identified in the Undertow web server framework, specifically affecting its handling of HTTP chunked transfer encoding responses when operating under Java 17 with TLSv1.3 enabled. The issue arises because Undertow fails to send the terminating chunk sequence (0\r\n) after the response body has been flushed. Although the response headers and body are transmitted, the absence of this termination causes the client to wait indefinitely for the end of the response. This behavior leads to uncontrolled recursion in resource consumption on the server side, as the server continues to allocate resources waiting for the client to acknowledge the end of the response. The result is a denial of service (DoS) condition, where server resources are exhausted, potentially causing service outages or degraded performance. The vulnerability affects Undertow versions from 0 up to 2.3.0.Alpha1 and is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits have been reported in the wild yet, but the vulnerability's nature makes it a significant concern for environments relying on Undertow with Java 17 TLSv1.3 configurations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of web services that utilize Undertow with Java 17 TLSv1.3. Public-facing applications, APIs, and internal services relying on this stack could be targeted by attackers to cause denial of service, leading to service disruptions, potential loss of customer trust, and operational downtime. Industries such as finance, healthcare, and government, which often deploy Java-based web servers, may experience critical impacts due to the reliance on continuous availability and stringent service level agreements. Additionally, the uncontrolled resource consumption could lead to increased operational costs and complicate incident response efforts. Given the vulnerability does not affect confidentiality or integrity, the primary concern remains service availability and resilience against DoS attacks.
Mitigation Recommendations
Organizations should prioritize updating Undertow to a version that addresses CVE-2024-5971 once a patch is released. Until then, practical mitigations include: 1) Temporarily disabling TLSv1.3 if feasible, or reverting to Java versions or TLS configurations not affected by this issue; 2) Implementing rate limiting and connection throttling at the network or application layer to mitigate potential DoS attempts exploiting this flaw; 3) Monitoring server resource utilization and network traffic for abnormal patterns indicative of exploitation attempts; 4) Employing Web Application Firewalls (WAFs) to detect and block malformed or suspicious chunked transfer requests; 5) Reviewing and testing application behavior under chunked transfer scenarios to identify and mitigate any cascading failures; 6) Engaging with Undertow and Java community channels for updates and recommended patches. These steps go beyond generic advice by focusing on configuration adjustments and proactive monitoring tailored to this vulnerability's characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-06-13T13:50:13.855Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68faafd950358b89bd7bfd50
Added to database: 10/23/2025, 10:44:41 PM
Last enriched: 10/23/2025, 10:51:22 PM
Last updated: 10/24/2025, 2:09:38 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Pwn2Own Underscores Secure Development Concerns
HighTired of Unpaid Toll Texts? Blame the 'Smishing Triad'
HighCVE-2024-7885: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
HighCVE-2025-7730: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-60023: CWE-23 in AutomationDirect Productivity Suite
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.