// For flags

CVE-2024-1410

Unbounded storage of information related to connection ID retirement, in quiche

Severity Score

3.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Cloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see RFC 9000 Section 5.1 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Endpoints declare the number of active connection IDs they are willing to support using the active_connection_id_limit transport parameter. The peer can create new IDs using a NEW_CONNECTION_ID frame but must stay within the active ID limit. This is done by retirement of old IDs, the endpoint sends NEW_CONNECTION_ID includes a value in the retire_prior_to field, which elicits a RETIRE_CONNECTION_ID frame as confirmation. An unauthenticated remote attacker can exploit the vulnerability by sending NEW_CONNECTION_ID frames and manipulating the connection (e.g. by restricting the peer's congestion window size) so that RETIRE_CONNECTION_ID frames can only be sent at a slower rate than they are received, leading to storage of information related to connection IDs in an unbounded queue. Quiche versions 0.19.2 and 0.20.1 are the earliest to address this problem. There is no workaround for affected versions.

Se descubrió que Cloudflare quiche era vulnerable al almacenamiento ilimitado de información relacionada con la retirada del ID de conexión, lo que podría provocar un consumo excesivo de recursos. Cada conexión QUIC posee un conjunto de Identificadores de conexión (ID); consulte RFC 9000 Sección 5.1 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1. Los endpoints declaran la cantidad de ID de conexión activa que están dispuestos a admitir mediante el parámetro de transporte active_connection_id_limit. El par puede crear nuevas ID utilizando un framework NEW_CONNECTION_ID pero debe permanecer dentro del límite de ID activo. Esto se hace retirando los ID antiguos, el endpoint envía NEW_CONNECTION_ID e incluye un valor en el campo retire_prior_to, que genera un framework RETIRE_CONNECTION_ID como confirmación. Un atacante remoto no autenticado puede explotar la vulnerabilidad enviando tramas NEW_CONNECTION_ID y manipulando la conexión (por ejemplo, restringiendo el tamaño de la ventana de congestión del par) de modo que las tramas RETIRE_CONNECTION_ID solo puedan enviarse a una velocidad más lenta de la que se reciben, lo que lleva al almacenamiento de información relacionada con ID de conexión en una cola ilimitada. Las versiones 0.19.2 y 0.20.1 de Quiche son las primeras en solucionar este problema. No existe ningún workaround para las versiones afectadas.

*Credits: Marten Seeman (@marten-seemann)
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-02-09 CVE Reserved
  • 2024-03-12 CVE Published
  • 2024-03-13 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
  • CAPEC-130: Excessive Allocation
  • CAPEC-272: Protocol Manipulation
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cloudflare
Search vendor "Cloudflare"
Quiche
Search vendor "Cloudflare" for product "Quiche"
>= 0.15.0 < 0.19.2
Search vendor "Cloudflare" for product "Quiche" and version " >= 0.15.0 < 0.19.2"
en
Affected
Cloudflare
Search vendor "Cloudflare"
Quiche
Search vendor "Cloudflare" for product "Quiche"
>= 0.20.0 < 0.20.1
Search vendor "Cloudflare" for product "Quiche" and version " >= 0.20.0 < 0.20.1"
en
Affected