CVE-2024-6875: Missing Release of Memory after Effective Lifetime
A vulnerability was found in the Infinispan component in Red Hat Data Grid. The REST compare API may have a buffer leak and an out of memory error can occur when sending continual requests with large POST data to the REST API.
AI Analysis
Technical Summary
CVE-2024-6875 is a vulnerability identified in the Infinispan component used within Red Hat Data Grid, specifically affecting the REST compare API. The issue arises from a missing release of memory after its effective lifetime, resulting in a buffer leak. When an attacker sends continuous requests containing large POST data to the REST API, the system fails to free allocated memory properly, causing an out-of-memory (OOM) condition. This memory exhaustion can degrade system performance or cause crashes, leading to denial of service (DoS). The vulnerability has a CVSS 3.1 base score of 6.5, indicating medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. This means the attack can be performed remotely over the network with low privileges, requires no user interaction, and impacts availability only. No confidentiality or integrity impact is noted. The vulnerability does not require authentication but does require some level of privilege (PR:L), suggesting that the attacker must have some access to the REST API endpoint. There are no known exploits in the wild at the time of publication. The vulnerability was reserved in July 2024 and published in March 2025. No patches or mitigation links are currently provided, indicating that organizations should monitor vendor advisories closely. The root cause is a failure in memory management within the REST compare API, which is critical for applications relying on Red Hat Data Grid for distributed caching and data storage. Continuous large POST requests can be used as a vector to trigger the memory leak, potentially leading to service disruption.
Potential Impact
For European organizations, the primary impact of CVE-2024-6875 is the risk of denial of service due to resource exhaustion in systems running Red Hat Data Grid with the vulnerable Infinispan component. This can disrupt critical applications that depend on distributed caching and data grid services, affecting business continuity and operational stability. Industries such as finance, telecommunications, and public sector entities that rely on Red Hat Data Grid for high availability and performance may experience service outages or degraded performance. Although confidentiality and integrity are not directly impacted, the availability impact can indirectly affect compliance with service-level agreements and regulatory requirements related to uptime and data availability. Organizations with exposed REST APIs or those that allow internal users or systems to send large POST requests without rate limiting are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. The medium severity rating suggests that while the vulnerability is serious, it is not critical, but it warrants prompt attention to avoid potential denial of service scenarios.
Mitigation Recommendations
To mitigate CVE-2024-6875, European organizations should implement the following specific measures: 1) Restrict access to the REST compare API by enforcing network segmentation and firewall rules to limit exposure only to trusted internal systems or authenticated users. 2) Implement rate limiting and request size restrictions on the REST API endpoints to prevent continuous large POST requests that could trigger the memory leak. 3) Monitor system memory usage and application logs for signs of memory leaks or abnormal resource consumption related to the Infinispan REST API. 4) Apply any available patches or updates from Red Hat as soon as they are released; maintain close communication with Red Hat support and subscribe to security advisories. 5) Conduct regular security assessments and penetration testing focusing on API abuse and resource exhaustion scenarios. 6) Consider deploying Web Application Firewalls (WAFs) or API gateways that can detect and block anomalous request patterns targeting the REST API. 7) If feasible, isolate the Red Hat Data Grid instances in containerized or virtualized environments with resource limits to contain potential impact. These measures go beyond generic advice by focusing on API access control, traffic shaping, and proactive monitoring tailored to the vulnerability's exploitation vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-6875: Missing Release of Memory after Effective Lifetime
Description
A vulnerability was found in the Infinispan component in Red Hat Data Grid. The REST compare API may have a buffer leak and an out of memory error can occur when sending continual requests with large POST data to the REST API.
AI-Powered Analysis
Technical Analysis
CVE-2024-6875 is a vulnerability identified in the Infinispan component used within Red Hat Data Grid, specifically affecting the REST compare API. The issue arises from a missing release of memory after its effective lifetime, resulting in a buffer leak. When an attacker sends continuous requests containing large POST data to the REST API, the system fails to free allocated memory properly, causing an out-of-memory (OOM) condition. This memory exhaustion can degrade system performance or cause crashes, leading to denial of service (DoS). The vulnerability has a CVSS 3.1 base score of 6.5, indicating medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. This means the attack can be performed remotely over the network with low privileges, requires no user interaction, and impacts availability only. No confidentiality or integrity impact is noted. The vulnerability does not require authentication but does require some level of privilege (PR:L), suggesting that the attacker must have some access to the REST API endpoint. There are no known exploits in the wild at the time of publication. The vulnerability was reserved in July 2024 and published in March 2025. No patches or mitigation links are currently provided, indicating that organizations should monitor vendor advisories closely. The root cause is a failure in memory management within the REST compare API, which is critical for applications relying on Red Hat Data Grid for distributed caching and data storage. Continuous large POST requests can be used as a vector to trigger the memory leak, potentially leading to service disruption.
Potential Impact
For European organizations, the primary impact of CVE-2024-6875 is the risk of denial of service due to resource exhaustion in systems running Red Hat Data Grid with the vulnerable Infinispan component. This can disrupt critical applications that depend on distributed caching and data grid services, affecting business continuity and operational stability. Industries such as finance, telecommunications, and public sector entities that rely on Red Hat Data Grid for high availability and performance may experience service outages or degraded performance. Although confidentiality and integrity are not directly impacted, the availability impact can indirectly affect compliance with service-level agreements and regulatory requirements related to uptime and data availability. Organizations with exposed REST APIs or those that allow internal users or systems to send large POST requests without rate limiting are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. The medium severity rating suggests that while the vulnerability is serious, it is not critical, but it warrants prompt attention to avoid potential denial of service scenarios.
Mitigation Recommendations
To mitigate CVE-2024-6875, European organizations should implement the following specific measures: 1) Restrict access to the REST compare API by enforcing network segmentation and firewall rules to limit exposure only to trusted internal systems or authenticated users. 2) Implement rate limiting and request size restrictions on the REST API endpoints to prevent continuous large POST requests that could trigger the memory leak. 3) Monitor system memory usage and application logs for signs of memory leaks or abnormal resource consumption related to the Infinispan REST API. 4) Apply any available patches or updates from Red Hat as soon as they are released; maintain close communication with Red Hat support and subscribe to security advisories. 5) Conduct regular security assessments and penetration testing focusing on API abuse and resource exhaustion scenarios. 6) Consider deploying Web Application Firewalls (WAFs) or API gateways that can detect and block anomalous request patterns targeting the REST API. 7) If feasible, isolate the Red Hat Data Grid instances in containerized or virtualized environments with resource limits to contain potential impact. These measures go beyond generic advice by focusing on API access control, traffic shaping, and proactive monitoring tailored to the vulnerability's exploitation vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-07-18T05:05:19.468Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda3c6
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 11/10/2025, 7:30:54 PM
Last updated: 12/5/2025, 2:02:06 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.