Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1634: Missing Release of Memory after Effective Lifetime

0
High
VulnerabilityCVE-2025-1634cvecve-2025-1634
Published: Wed Feb 26 2025 (02/26/2025, 16:56:23 UTC)
Source: CVE Database V5

Description

A flaw was found in the quarkus-resteasy extension, which causes memory leaks when client requests with low timeouts are made. If a client request times out, a buffer is not released correctly, leading to increased memory usage and eventual application crash due to OutOfMemoryError.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:22:17 UTC

Technical Analysis

CVE-2025-1634 identifies a memory management flaw in the quarkus-resteasy extension, a component widely used in Java-based microservices architectures for RESTful API implementation. The vulnerability arises when client requests specify very low timeout values. In such cases, if the request times out before completion, the internal buffer allocated for processing the request is not released properly. This leads to a memory leak that accumulates over time as more timed-out requests occur. The consequence is a gradual increase in memory consumption that can culminate in an OutOfMemoryError, causing the application to crash and become unavailable. The vulnerability does not compromise data confidentiality or integrity but directly affects service availability. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no required privileges or user interaction, and the attack vector is network-based, making it remotely exploitable. No patches or exploits are currently documented, but the flaw’s nature suggests that attackers could induce denial-of-service conditions by sending numerous requests with low timeout settings. This vulnerability is particularly critical for environments with high request volumes or where low timeout configurations are common, such as in microservices or cloud-native applications.

Potential Impact

The primary impact of CVE-2025-1634 is on service availability. Affected applications can experience memory exhaustion leading to crashes, resulting in denial-of-service (DoS) conditions. This can disrupt business operations, degrade user experience, and potentially cause cascading failures in distributed systems relying on the vulnerable service. Organizations running critical infrastructure or customer-facing APIs using quarkus-resteasy are at risk of outages. The vulnerability does not expose sensitive data or allow unauthorized access, but the loss of availability can have significant operational and financial consequences. Attackers can exploit this flaw remotely without authentication, increasing the risk of widespread disruption, especially in high-traffic environments or automated attack scenarios. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability’s characteristics make it a likely target once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-1634, organizations should monitor memory usage patterns closely in applications using the quarkus-resteasy extension, especially under load conditions with low client timeout settings. Immediate mitigation includes adjusting client timeout configurations to avoid extremely low values that trigger the leak. Implementing rate limiting or request throttling can reduce the volume of potentially malicious or misconfigured requests causing timeouts. Once patches or updates are released by the quarkus project or maintainers, prompt application of these fixes is critical. Additionally, consider deploying application-level memory monitoring and alerting to detect abnormal memory growth early. In containerized or cloud environments, automated restarts or scaling policies can help maintain availability during incidents. Reviewing and testing fallback mechanisms for service continuity is also advisable. Finally, conduct security assessments to identify if the vulnerable extension is in use and prioritize remediation accordingly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-02-24T14:23:22.369Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68629a946f40f0eb728bd83d

Added to database: 6/30/2025, 2:09:24 PM

Last enriched: 2/27/2026, 12:22:17 PM

Last updated: 3/24/2026, 8:13:46 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses