Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6875: Missing Release of Memory after Effective Lifetime

0
Medium
VulnerabilityCVE-2024-6875cvecve-2024-6875
Published: Fri Mar 28 2025 (03/28/2025, 20:34:30 UTC)
Source: CVE

Description

A vulnerability was found in the Infinispan component in Red Hat Data Grid. The REST compare API may have a buffer leak and an out of memory error can occur when sending continual requests with large POST data to the REST API.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:51:24 UTC

Technical Analysis

CVE-2024-6875 identifies a vulnerability in the Infinispan component of Red Hat Data Grid, specifically within the REST compare API. The issue arises from a missing release of memory after its effective lifetime, leading to a buffer leak. When an attacker sends continual POST requests containing large payloads to the REST API, the system fails to free allocated memory properly, causing memory consumption to grow uncontrollably. This results in out-of-memory errors that can degrade or crash the service, effectively causing a denial-of-service (DoS) condition. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) shows that the attack can be performed remotely over the network with low privileges, requires no user interaction, and impacts only availability without compromising confidentiality or integrity. No known exploits have been reported in the wild, and no patches or mitigations have been explicitly linked yet. The vulnerability affects all versions indicated as '0' in the data, which likely means the initial or unspecified versions of the component. This memory leak vulnerability can be exploited by an attacker to disrupt services relying on Red Hat Data Grid, especially those exposing the REST compare API to untrusted networks or users.

Potential Impact

The primary impact of CVE-2024-6875 is on the availability of systems running Red Hat Data Grid with the vulnerable Infinispan REST compare API. Successful exploitation leads to memory exhaustion, causing service degradation or crashes, resulting in denial-of-service conditions. This can disrupt business-critical applications relying on Red Hat Data Grid for caching or data grid services, potentially affecting application performance and uptime. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, service outages can impact operational continuity, customer experience, and potentially lead to financial losses or reputational damage. Organizations with high transaction volumes or those exposing the REST API to external or untrusted networks are at increased risk. The requirement for low privileges means that even less-privileged users or compromised internal accounts could trigger the issue, expanding the threat surface. Given the lack of known exploits, the immediate risk is moderate, but the potential for DoS attacks warrants proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2024-6875, organizations should first monitor Red Hat and Infinispan advisories for official patches or updates addressing the memory leak. Until patches are available, implement strict rate limiting on the REST compare API to prevent continuous large POST requests from overwhelming the system. Enforce maximum payload size restrictions on incoming POST data to reduce memory consumption risks. Employ network-level controls such as firewall rules or API gateways to restrict access to the REST API to trusted users and networks only. Regularly monitor system memory usage and set up alerts for unusual spikes that may indicate exploitation attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious request patterns targeting the REST API. Review and tighten user privileges to ensure only necessary accounts have access to the REST API, minimizing the potential for low-privilege exploitation. Finally, conduct thorough testing of the environment to identify any abnormal behavior related to memory usage under load.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-07-18T05:05:19.468Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda3c6

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 2/28/2026, 3:51:24 AM

Last updated: 3/26/2026, 9:30:47 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses