Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5971: Uncontrolled Recursion

0
High
VulnerabilityCVE-2024-5971cvecve-2024-5971
Published: Mon Jul 08 2024 (07/08/2024, 20:51:29 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

AI-Powered Analysis

AILast updated: 10/23/2025, 22:51:22 UTC

Technical Analysis

CVE-2024-5971 is a vulnerability identified in the Undertow web server framework, specifically affecting its handling of HTTP chunked transfer encoding responses when operating under Java 17 with TLSv1.3 enabled. The issue arises because Undertow fails to send the terminating chunk sequence (0\r\n) after the response body has been flushed. Although the response headers and body are transmitted, the absence of this termination causes the client to wait indefinitely for the end of the response. This behavior leads to uncontrolled recursion in resource consumption on the server side, as the server continues to allocate resources waiting for the client to acknowledge the end of the response. The result is a denial of service (DoS) condition, where server resources are exhausted, potentially causing service outages or degraded performance. The vulnerability affects Undertow versions from 0 up to 2.3.0.Alpha1 and is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits have been reported in the wild yet, but the vulnerability's nature makes it a significant concern for environments relying on Undertow with Java 17 TLSv1.3 configurations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of web services that utilize Undertow with Java 17 TLSv1.3. Public-facing applications, APIs, and internal services relying on this stack could be targeted by attackers to cause denial of service, leading to service disruptions, potential loss of customer trust, and operational downtime. Industries such as finance, healthcare, and government, which often deploy Java-based web servers, may experience critical impacts due to the reliance on continuous availability and stringent service level agreements. Additionally, the uncontrolled resource consumption could lead to increased operational costs and complicate incident response efforts. Given the vulnerability does not affect confidentiality or integrity, the primary concern remains service availability and resilience against DoS attacks.

Mitigation Recommendations

Organizations should prioritize updating Undertow to a version that addresses CVE-2024-5971 once a patch is released. Until then, practical mitigations include: 1) Temporarily disabling TLSv1.3 if feasible, or reverting to Java versions or TLS configurations not affected by this issue; 2) Implementing rate limiting and connection throttling at the network or application layer to mitigate potential DoS attempts exploiting this flaw; 3) Monitoring server resource utilization and network traffic for abnormal patterns indicative of exploitation attempts; 4) Employing Web Application Firewalls (WAFs) to detect and block malformed or suspicious chunked transfer requests; 5) Reviewing and testing application behavior under chunked transfer scenarios to identify and mitigate any cascading failures; 6) Engaging with Undertow and Java community channels for updates and recommended patches. These steps go beyond generic advice by focusing on configuration adjustments and proactive monitoring tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-06-13T13:50:13.855Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68faafd950358b89bd7bfd50

Added to database: 10/23/2025, 10:44:41 PM

Last enriched: 10/23/2025, 10:51:22 PM

Last updated: 10/24/2025, 2:09:38 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats