A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2322 A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.
Github GHSA Github GHSA GHSA-ch7q-gpff-h9hp Undertow Missing Release of Memory after Effective Lifetime vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

Setting the maxAge configuration is sufficient to prevent the behavior of this vulnerability being explored.

History

Sat, 08 Nov 2025 04:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8

Fri, 07 Nov 2025 09:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8

Thu, 19 Jun 2025 04:00:00 +0900

Type Values Removed Values Added
First Time appeared Redhat apache Camel Hawtio
CPEs cpe:/a:redhat:rhboac_hawtio:4 cpe:/a:redhat:apache_camel_hawtio:4
Vendors & Products Redhat rhboac Hawtio
Redhat apache Camel Hawtio

Mon, 25 Nov 2024 08:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:camel_spring_boot:3

Fri, 22 Nov 2024 21:00:00 +0900

Type Values Removed Values Added
References

Sat, 19 Oct 2024 09:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:camel_spring_boot:3

Tue, 24 Sep 2024 05:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:quarkus:3 cpe:/a:redhat:quarkus:2
cpe:/a:redhat:quarkus:3.8::el8
References

Fri, 20 Sep 2024 05:30:00 +0900

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 17:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak:22 cpe:/a:redhat:build_keycloak:

Fri, 30 Aug 2024 05:30:00 +0900

Type Values Removed Values Added
References

Fri, 09 Aug 2024 06:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:7 cpe:/a:redhat:jboss_enterprise_application_platform:7.4
cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-07T18:44:40.524Z

Reserved: 2024-04-11T04:14:52.345Z

Link: CVE-2024-3653

cve-icon Vulnrichment

Updated: 2024-08-28T15:02:47.378Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-08T22:15:02.527

Modified: 2024-11-21T09:30:06.253

Link: CVE-2024-3653

cve-icon Redhat

Severity : Low

Publid Date: 2024-07-08T20:53:45Z

Links: CVE-2024-3653 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses