Search for vulnerabilities
Vulnerability details: VCID-ym9e-zbqf-1ycg
Vulnerability ID VCID-ym9e-zbqf-1ycg
Aliases CVE-2024-27983
Summary An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27983.json
epss 0.65913 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.65913 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.6865 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
epss 0.69088 https://api.first.org/data/v1/epss?cve=CVE-2024-27983
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 8.2 https://hackerone.com/reports/2319584
ssvc Track https://hackerone.com/reports/2319584
cvssv3 8.2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/
cvssv3 8.2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/
archlinux High https://security.archlinux.org/AVG-2852
archlinux High https://security.archlinux.org/AVG-2853
cvssv3 8.2 https://security.netapp.com/advisory/ntap-20240510-0002/
ssvc Track https://security.netapp.com/advisory/ntap-20240510-0002/
cvssv3 8.2 http://www.openwall.com/lists/oss-security/2024/04/03/16
ssvc Track http://www.openwall.com/lists/oss-security/2024/04/03/16
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27983.json
https://api.first.org/data/v1/epss?cve=CVE-2024-27983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27983
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
http://www.openwall.com/lists/oss-security/2024/04/03/16
1068347 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068347
2272764 https://bugzilla.redhat.com/show_bug.cgi?id=2272764
2319584 https://hackerone.com/reports/2319584
AVG-2852 https://security.archlinux.org/AVG-2852
AVG-2853 https://security.archlinux.org/AVG-2853
CVE-2024-27983 https://nvd.nist.gov/vuln/detail/CVE-2024-27983
JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/
ntap-20240510-0002 https://security.netapp.com/advisory/ntap-20240510-0002/
RHSA-2024:2778 https://access.redhat.com/errata/RHSA-2024:2778
RHSA-2024:2779 https://access.redhat.com/errata/RHSA-2024:2779
RHSA-2024:2780 https://access.redhat.com/errata/RHSA-2024:2780
RHSA-2024:2853 https://access.redhat.com/errata/RHSA-2024:2853
RHSA-2024:2910 https://access.redhat.com/errata/RHSA-2024:2910
RHSA-2024:2937 https://access.redhat.com/errata/RHSA-2024:2937
RHSA-2024:3472 https://access.redhat.com/errata/RHSA-2024:3472
RHSA-2024:3544 https://access.redhat.com/errata/RHSA-2024:3544
RHSA-2024:3545 https://access.redhat.com/errata/RHSA-2024:3545
RHSA-2024:3553 https://access.redhat.com/errata/RHSA-2024:3553
RHSA-2024:4353 https://access.redhat.com/errata/RHSA-2024:4353
RHSA-2024:4824 https://access.redhat.com/errata/RHSA-2024:4824
YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27983.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Found at https://hackerone.com/reports/2319584
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/ Found at https://hackerone.com/reports/2319584
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Found at https://security.netapp.com/advisory/ntap-20240510-0002/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/ Found at https://security.netapp.com/advisory/ntap-20240510-0002/
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Found at http://www.openwall.com/lists/oss-security/2024/04/03/16
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/ Found at http://www.openwall.com/lists/oss-security/2024/04/03/16
Exploit Prediction Scoring System (EPSS)
Percentile 0.98446
EPSS Score 0.65913
Published At Aug. 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:37:10.405891+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/edge/main.json 37.0.0