Skip to main content

CVE-2024-6875: Missing Release of Memory after Effective Lifetime

Medium
VulnerabilityCVE-2024-6875cvecve-2024-6875
Published: Fri Mar 28 2025 (03/28/2025, 20:34:30 UTC)
Source: CVE

Description

A vulnerability was found in the Infinispan component in Red Hat Data Grid. The REST compare API may have a buffer leak and an out of memory error can occur when sending continual requests with large POST data to the REST API.

AI-Powered Analysis

AILast updated: 07/05/2025, 17:55:26 UTC

Technical Analysis

CVE-2024-6875 is a medium severity vulnerability identified in the Infinispan component used within Red Hat Data Grid. The issue arises in the REST compare API, where a memory management flaw leads to a buffer leak. Specifically, when the API receives continual requests containing large POST data payloads, it fails to release allocated memory after its effective lifetime. This results in a gradual increase in memory consumption, potentially culminating in an out-of-memory (OOM) condition on the affected server. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects availability (A:H) without compromising confidentiality or integrity. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by an authenticated attacker with network access to degrade or disrupt service availability by exhausting system memory resources. This could lead to denial of service (DoS) conditions, impacting applications relying on Red Hat Data Grid for distributed caching or data grid services. The vulnerability was reserved in July 2024 and published in March 2025, with a CVSS v3.1 score of 6.5 indicating medium severity. No patches or mitigations are explicitly linked in the provided data, but remediation would typically involve applying vendor patches or updates that fix the memory leak in the REST compare API handling logic.

Potential Impact

For European organizations, the impact of CVE-2024-6875 can be significant, especially for enterprises relying on Red Hat Data Grid for critical data caching and distributed data management. An attacker exploiting this vulnerability could cause service outages or degraded performance due to memory exhaustion, affecting business continuity and availability of applications. This is particularly critical for sectors such as finance, telecommunications, healthcare, and government services where high availability and data grid performance are essential. The denial of service caused by memory leaks could disrupt real-time data processing, transactional systems, or cloud-native applications that depend on Infinispan. Additionally, organizations with strict uptime requirements or those operating in regulated environments may face compliance and operational risks if the vulnerability is exploited. While confidentiality and integrity are not directly impacted, the availability degradation could indirectly affect trust and operational reliability.

Mitigation Recommendations

To mitigate CVE-2024-6875, European organizations should: 1) Monitor and limit the size and frequency of POST requests to the REST compare API to reduce memory pressure. 2) Implement network-level access controls and authentication mechanisms to restrict access to the REST API only to trusted and authorized users or systems, minimizing exposure to potential attackers. 3) Apply any available patches or updates from Red Hat promptly once released to address the memory leak. 4) Employ resource monitoring and alerting on memory usage of Red Hat Data Grid instances to detect abnormal increases indicative of exploitation attempts. 5) Consider deploying rate limiting or API gateway solutions to throttle excessive or suspicious API requests. 6) Conduct regular security assessments and penetration testing focusing on API endpoints to identify and remediate similar resource exhaustion vulnerabilities. 7) In environments where patching is delayed, consider temporary workarounds such as restarting affected services periodically to release leaked memory, though this is not a long-term solution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-07-18T05:05:19.468Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda3c6

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 5:55:26 PM

Last updated: 8/19/2025, 10:41:20 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats