Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6162: Uncontrolled Resource Consumption

0
High
VulnerabilityCVE-2024-6162cvecve-2024-6162
Published: Thu Jun 20 2024 (06/20/2024, 14:33:10 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up.

AI-Powered Analysis

AILast updated: 11/14/2025, 11:56:31 UTC

Technical Analysis

CVE-2024-6162 is a vulnerability identified in the Undertow web server framework, specifically affecting versions up to 2.3.0.Alpha1. The flaw arises from the mishandling of URL-encoded request paths when processed concurrently on the AJP (Apache JServ Protocol) listener. Undertow uses a shared buffer to decode these paths, but concurrent requests cause this buffer to be overwritten or corrupted, leading to incorrect path information being processed. Consequently, the server may attempt to access incorrect resources, resulting in HTTP 404 errors or other application-level failures. This behavior can disrupt normal service operations, effectively causing a denial of service (DoS) condition by making legitimate resources unavailable. The vulnerability does not compromise confidentiality or integrity but severely impacts availability. It can be exploited remotely without requiring authentication or user interaction, making it a significant risk for exposed Undertow instances. No known exploits are currently reported in the wild, but the ease of triggering this flaw suggests potential for future exploitation. The CVSS 3.1 score of 7.5 reflects a high severity, driven by network attack vector, low complexity, no privileges required, and no user interaction needed. The issue is particularly relevant for environments where Undertow is used as a backend or front-facing server with AJP enabled, commonly found in Java-based enterprise applications and middleware stacks.

Potential Impact

For European organizations, the primary impact of CVE-2024-6162 is service disruption due to denial of service conditions caused by path decoding errors. This can lead to downtime of web applications relying on Undertow, affecting business continuity, user experience, and potentially causing financial losses. Critical infrastructure or government services using Undertow could face availability issues, undermining trust and operational stability. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely; however, the loss of availability can indirectly impact compliance with regulations such as GDPR if service interruptions affect data access or processing. The ease of exploitation and lack of required authentication increase the risk profile, especially for externally facing services. Organizations with high traffic volumes or concurrent request loads are more susceptible to triggering the flaw, amplifying the potential impact. Additionally, the inability to correctly route requests may complicate incident response and troubleshooting efforts.

Mitigation Recommendations

To mitigate CVE-2024-6162, organizations should prioritize upgrading Undertow to a patched version once released by the maintainers. Until a patch is available, consider disabling the AJP listener if it is not essential, or restrict access to it via network segmentation and firewall rules to limit exposure. Implement rate limiting and concurrency controls on incoming requests to reduce the likelihood of simultaneous path decoding conflicts. Monitoring logs for unusual 404 errors or application failures can help detect exploitation attempts early. Employ application-layer gateways or reverse proxies to validate and sanitize incoming requests before they reach Undertow. Additionally, conduct thorough testing of web applications under concurrent load to identify and address any related stability issues. Engage with vendors and open-source communities for timely updates and advisories. Document and rehearse incident response plans focused on availability disruptions to minimize downtime impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-06-19T12:35:30.284Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690dcfa5c2e5047ad7418679

Added to database: 11/7/2025, 10:53:25 AM

Last enriched: 11/14/2025, 11:56:31 AM

Last updated: 12/26/2025, 7:23:06 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats