A flaw was found in Undertow. Servlets using a method that calls HttpServletRequestImpl.getParameterNames() can cause an OutOfMemoryError when the client sends a request with large parameter names. This issue can be exploited by an unauthorized user to cause a remote denial-of-service (DoS) attack.

Project Subscriptions

Vendors Products
Amq Streams Subscribe
Apache Camel Hawtio Subscribe
Build Keycloak Subscribe
Camel Quarkus Subscribe
Camel Spring Boot Subscribe
Integration Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Fuse Subscribe
Jboss Fuse Service Works Subscribe
Jbosseapxp Subscribe
Optaplanner Subscribe
Quarkus Subscribe
Red Hat Single Sign On Subscribe
Serverless Subscribe
Service Registry Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-33hj-rcmx-86mv Undertow Servlets Vulnerable to Remote DoS via OutOfMemoryError when Passed Large Parameter Names
Fixes

Solution

No solution given by the vendor.


Workaround

Currently no mitigation is available for this vulnerability. Please make sure to perform the update as they become available.

History

Sat, 31 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 30 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Undertow. Servlets using a method that calls HttpServletRequestImpl.getParameterNames() can cause an OutOfMemoryError when the client sends a request with large parameter names. This issue can be exploited by an unauthorized user to cause a remote denial-of-service (DoS) attack.
Title Undertow: outofmemoryerror in httpservletrequestimpl.getparameternames() can cause remote dos attacks
First Time appeared Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
Weaknesses CWE-20
CPEs cpe:/a:redhat:amq_streams:1
cpe:/a:redhat:apache_camel_hawtio:4
cpe:/a:redhat:build_keycloak:
cpe:/a:redhat:camel_quarkus:3
cpe:/a:redhat:camel_spring_boot:3
cpe:/a:redhat:camel_spring_boot:4
cpe:/a:redhat:integration:1
cpe:/a:redhat:jboss_data_grid:7
cpe:/a:redhat:jboss_data_grid:8
cpe:/a:redhat:jboss_enterprise_application_platform:7
cpe:/a:redhat:jboss_enterprise_application_platform:8
cpe:/a:redhat:jboss_enterprise_bpms_platform:7
cpe:/a:redhat:jboss_fuse:7
cpe:/a:redhat:jboss_fuse_service_works:6
cpe:/a:redhat:jbosseapxp
cpe:/a:redhat:optaplanner:::el6
cpe:/a:redhat:quarkus:2
cpe:/a:redhat:red_hat_single_sign_on:7
cpe:/a:redhat:serverless:1
cpe:/a:redhat:service_registry:2
Vendors & Products Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-01-30T14:41:46.201Z

Reserved: 2024-04-22T13:10:21.747Z

Link: CVE-2024-4027

cve-icon Vulnrichment

Updated: 2026-01-30T14:41:29.080Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-30T15:16:07.113

Modified: 2026-02-04T16:34:21.763

Link: CVE-2024-4027

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-30T14:00:00Z

Links: CVE-2024-4027 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses