CVE-2024-22201
Eclipse
CVE-2024-22201 is a vulnerability in the Jetty web server that can lead to a denial-of-service. This flaw involves the improper handling of HTTP/2 SSL connections experiencing TCP congestion. When these connections time out, they are leaked, potentially exhausting the server's file descriptors.
CVE-2024-22201 affects versions 9.4.x, 10.0.x, 11.0.x and 12.0.x of Jetty. With an SVRS score of 30, this vulnerability is currently considered low risk. An attacker exploiting this vulnerability could cause the server to become unresponsive to legitimate client requests. It is recommended to patch to versions 9.4.54, 10.0.20, 11.0.20, and 12.0.6 to mitigate this threat and prevent potential service disruptions.
Description:
CVE-2024-22201 is a vulnerability in Jetty, a Java-based web server and servlet engine. It allows an attacker to cause a denial-of-service (DoS) condition by establishing an HTTP/2 SSL connection and causing it to time out. This can lead to the server running out of file descriptors and eventually stopping accepting new connections from valid clients. The vulnerability has a CVSS score of 7.5 and an SVRS of 42, indicating a moderate level of severity.
Key Insights:
- The vulnerability can be exploited remotely, allowing an attacker to launch a DoS attack without having to gain access to the server.
- The vulnerability affects all versions of Jetty prior to 9.4.54, 10.0.20, 11.0.20, and 12.0.6.
- The vulnerability is actively exploited in the wild, with reports of attacks targeting servers running Jetty.
- The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the vulnerability, calling for immediate and necessary measures to mitigate the risk.
Mitigation Strategies:
- Update Jetty to version 9.4.54, 10.0.20, 11.0.20, or 12.0.6 or later.
- Implement rate limiting on incoming HTTP/2 connections to prevent an attacker from establishing a large number of connections.
- Use a web application firewall (WAF) to block malicious requests that attempt to exploit the vulnerability.
- Monitor network traffic for signs of a DoS attack and take appropriate action to mitigate the attack.
Additional Information:
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.