First published: Wed Aug 14 2024(Updated: )
When NGINX Plus is configured to use the MQTT filter module, undisclosed requests can cause an increase in memory resource utilization.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | =30 | 32 |
Nginx | =r30 | |
Nginx | =r30-p1 | |
Nginx | =r30-p2 | |
Nginx | =r31 | |
Nginx | =r31-p1 | |
Nginx | =r32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-39792 has not been explicitly disclosed, but it impacts memory resource utilization, which could lead to performance issues.
To fix CVE-2024-39792, ensure you are using the latest versions of NGINX Plus, specifically versions after r32, as they may contain mitigations or fixes.
The affected versions of NGINX Plus for CVE-2024-39792 include r30, r30-p1, r30-p2, r31, r31-p1, and r32.
CVE-2024-39792 involves an increase in memory resource utilization when using the MQTT filter and pre-read modules in NGINX Plus.
Yes, CVE-2024-39792 can potentially lead to a denial of service due to increased memory consumption by undisclosed requests.