5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
7.1 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.5%
Security Advisory Description
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory. (CVE-2024-34161)
Note: This issue affects NGINX systems compiled with thengx_http_v3_modulemodule, where the configuration contains alistendirective with thequic option enabled. The HTTP/3 QUIC module is considered an experimental feature and is not compiled by default in NGINX OSS, but it is compiled by default in NGINX Plus. For more information, refer to Support for QUIC and HTTP/3.
Impact
This vulnerability allows a remote unauthenticated attacker to cause leakage of previously freed memory. The potentially leaked memory is random, cannot be controlled by the attacker, and does not include NGINX configuration or private keys. There is no control plane exposure; this is a data plane issue only.
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
7.1 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.5%