CVE-2024-5971: Uncontrolled Recursion
A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.
AI Analysis
Technical Summary
CVE-2024-5971 is a vulnerability discovered in the Undertow web server framework, which is widely used in Java applications for handling HTTP requests and responses. The issue arises specifically when Undertow is deployed on Java 17 environments utilizing TLS 1.3. During chunked transfer encoding responses, Undertow fails to send the terminating chunk sequence (0\r\n) after flushing the response body. Although the response headers and body are transmitted, the client continues to wait for the termination signal, causing the connection to hang. This behavior leads to uncontrolled recursion in resource consumption on the server side, as connections remain open and resources are not released properly. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by enabling denial of service attacks. The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No public exploits have been reported yet, but the flaw is critical for environments using Undertow versions up to 2.3.0.Alpha1 on Java 17 with TLS 1.3. The root cause is a protocol handling bug in chunked transfer encoding implementation under these specific conditions.
Potential Impact
The primary impact of CVE-2024-5971 is denial of service due to resource exhaustion on servers running vulnerable Undertow versions with Java 17 TLS 1.3. Attackers can exploit this remotely without authentication or user interaction by sending specially crafted HTTP requests that trigger the chunked response hang. This can lead to server unavailability, degraded performance, and potential downtime for web applications relying on Undertow. Organizations with critical services exposed to the internet using this stack may face operational disruptions and reputational damage. Since the vulnerability affects availability only, data confidentiality and integrity remain intact. However, prolonged denial of service can indirectly affect business continuity and customer trust. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
To mitigate CVE-2024-5971, organizations should first upgrade Undertow to a patched version beyond 2.3.0.Alpha1 once available from official maintainers. Until patches are released, consider the following specific actions: 1) Disable or avoid using TLS 1.3 on Java 17 environments running Undertow if feasible, reverting to TLS 1.2 to prevent triggering the bug. 2) Implement rate limiting and connection timeouts on HTTP endpoints to reduce the impact of hanging connections. 3) Monitor server resource usage and connection states to detect abnormal accumulation of hanging chunked responses. 4) Use web application firewalls (WAFs) or reverse proxies to filter or block suspicious chunked transfer requests. 5) Review and update Java runtime environments and Undertow configurations to ensure compatibility and stability. 6) Conduct thorough testing in staging environments before deploying changes to production. These targeted mitigations go beyond generic advice by focusing on the specific conditions that trigger the vulnerability.
Affected Countries
United States, Germany, India, Japan, Brazil, United Kingdom, France, Canada, Australia, South Korea
CVE-2024-5971: Uncontrolled Recursion
Description
A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-5971 is a vulnerability discovered in the Undertow web server framework, which is widely used in Java applications for handling HTTP requests and responses. The issue arises specifically when Undertow is deployed on Java 17 environments utilizing TLS 1.3. During chunked transfer encoding responses, Undertow fails to send the terminating chunk sequence (0\r\n) after flushing the response body. Although the response headers and body are transmitted, the client continues to wait for the termination signal, causing the connection to hang. This behavior leads to uncontrolled recursion in resource consumption on the server side, as connections remain open and resources are not released properly. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by enabling denial of service attacks. The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No public exploits have been reported yet, but the flaw is critical for environments using Undertow versions up to 2.3.0.Alpha1 on Java 17 with TLS 1.3. The root cause is a protocol handling bug in chunked transfer encoding implementation under these specific conditions.
Potential Impact
The primary impact of CVE-2024-5971 is denial of service due to resource exhaustion on servers running vulnerable Undertow versions with Java 17 TLS 1.3. Attackers can exploit this remotely without authentication or user interaction by sending specially crafted HTTP requests that trigger the chunked response hang. This can lead to server unavailability, degraded performance, and potential downtime for web applications relying on Undertow. Organizations with critical services exposed to the internet using this stack may face operational disruptions and reputational damage. Since the vulnerability affects availability only, data confidentiality and integrity remain intact. However, prolonged denial of service can indirectly affect business continuity and customer trust. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
To mitigate CVE-2024-5971, organizations should first upgrade Undertow to a patched version beyond 2.3.0.Alpha1 once available from official maintainers. Until patches are released, consider the following specific actions: 1) Disable or avoid using TLS 1.3 on Java 17 environments running Undertow if feasible, reverting to TLS 1.2 to prevent triggering the bug. 2) Implement rate limiting and connection timeouts on HTTP endpoints to reduce the impact of hanging connections. 3) Monitor server resource usage and connection states to detect abnormal accumulation of hanging chunked responses. 4) Use web application firewalls (WAFs) or reverse proxies to filter or block suspicious chunked transfer requests. 5) Review and update Java runtime environments and Undertow configurations to ensure compatibility and stability. 6) Conduct thorough testing in staging environments before deploying changes to production. These targeted mitigations go beyond generic advice by focusing on the specific conditions that trigger the vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-06-13T13:50:13.855Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68faafd950358b89bd7bfd50
Added to database: 10/23/2025, 10:44:41 PM
Last enriched: 2/28/2026, 3:42:21 AM
Last updated: 3/22/2026, 2:54:14 PM
Views: 266
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.