Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9622: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

0
Medium
VulnerabilityCVE-2024-9622cvecve-2024-9622
Published: Tue Oct 08 2024 (10/08/2024, 16:26:13 UTC)
Source: CVE Database V5

Description

A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk.

AI-Powered Analysis

AILast updated: 11/21/2025, 08:34:55 UTC

Technical Analysis

CVE-2024-9622 is a vulnerability identified in the resteasy-netty4 library, which is a Java-based framework component used for RESTful web services built on top of the Netty network application framework. The vulnerability arises from the improper handling of HTTP requests containing ASCII control characters, which are used in HTTP request smuggling attacks. Specifically, when an attacker sends a crafted HTTP request with such control characters, the Netty HttpObjectDecoder transitions into a BAD_MESSAGE state. This state causes the decoder to ignore any subsequent legitimate HTTP requests on the same persistent connection, effectively causing a denial-of-service condition by making clients experience timeouts. This behavior can severely impact systems that rely on persistent HTTP connections, such as those behind load balancers or reverse proxies that reuse connections to backend servers. The vulnerability does not allow for data leakage or unauthorized data modification but disrupts service availability. The CVSS v3.1 score is 5.3 (medium severity), reflecting its network attack vector, low complexity, no privileges required, no user interaction, and impact limited to availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed, necessitating proactive mitigation. Organizations using resteasy-netty4 in their web service stacks, especially in microservices or API gateway contexts, are vulnerable if they accept HTTP requests over persistent connections without additional filtering or validation.

Potential Impact

For European organizations, the primary impact of CVE-2024-9622 is service disruption due to denial-of-service conditions on web services that utilize the vulnerable resteasy-netty4 library. This can lead to client timeouts, degraded user experience, and potential operational downtime, particularly for critical applications relying on RESTful APIs and persistent HTTP connections. Industries such as finance, telecommunications, and public sector services that depend on high availability and low latency web services could face operational risks. Load balancers and reverse proxies that reuse connections to backend services may amplify the impact by allowing a single malicious request to disrupt multiple legitimate requests. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can indirectly affect business continuity and customer trust. The lack of known exploits in the wild suggests limited immediate threat, but the public disclosure increases the risk of future exploitation attempts, especially in automated attack scenarios.

Mitigation Recommendations

To mitigate CVE-2024-9622, organizations should first verify if their infrastructure uses the resteasy-netty4 library and identify affected versions. Since no official patches are currently available, temporary mitigations include implementing strict input validation and filtering at the perimeter to block HTTP requests containing suspicious ASCII control characters or malformed headers indicative of request smuggling attempts. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block anomalous HTTP request patterns. Additionally, configuring load balancers and proxies to limit or disable HTTP persistent connections where feasible can reduce the attack surface by forcing connection resets between requests. Monitoring logs for BAD_MESSAGE states or unusual connection drops can help detect exploitation attempts. Organizations should track vendor advisories for forthcoming patches and plan timely updates once available. Finally, adopting defense-in-depth strategies, including rate limiting and anomaly detection, will help mitigate the risk until a permanent fix is deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-08T08:48:41.620Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920235bcf2d47c38997b88b

Added to database: 11/21/2025, 8:31:23 AM

Last enriched: 11/21/2025, 8:34:55 AM

Last updated: 1/7/2026, 8:46:15 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats