First published: Wed May 29 2024(Updated: )
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or cause other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | =30 | 32 |
Nginx | >=1.25.0<=1.26.0 | 1.27.01.26.1 |
Nginx | >=1.25.0<1.26.1 | |
Nginx | =r30 | |
Nginx | =r30-p1 | |
Nginx | =r30-p2 | |
Nginx | =r31 | |
Nginx | =r31-p1 | |
Fedora | =39 | |
Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31079 has not yet been assigned a specific severity rating, but it can lead to unexpected worker process termination in NGINX configurations using HTTP/3.
To mitigate CVE-2024-31079, you should update to the latest patched version of NGINX Plus or NGINX Open Source as recommended by F5.
CVE-2024-31079 affects NGINX Plus versions 30 and 31, and NGINX Open Source versions between 1.25.0 and 1.26.0.
CVE-2024-31079 can be exploited through specifically timed HTTP/3 requests during the connection draining process.
Yes, CVE-2024-31079 can impact system availability by causing NGINX worker processes to terminate unexpectedly.