CVE-2021-3690
Description
A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Undertow WebSocket PONG message memory leak allows denial of service via memory exhaustion.
CVE-2021-3690 is a vulnerability in the Undertow web server. The flaw is a buffer leak that occurs when the server processes an incoming WebSocket PONG message. The root cause is improper release of allocated buffers, which leads to memory exhaustion over time [1][3].
The attack surface is the WebSocket endpoint. An attacker can trigger repeated PONG messages without prior authentication, as the vulnerability can be exploited pre-authentication in many configurations. The attack can be carried out over the network from an unprivileged position, requiring no special access or credentials [1][2][3].
Successful exploitation results in a denial of service (DoS) due to memory exhaustion, making the server unavailable for legitimate requests. The CVSS 3.1 base score of 7.5 (High) reflects the relatively low complexity and network-based attack vector, with the primary impact on availability [1][2][3].
Red Hat and other vendors have released patches for this flaw. Users should update Undertow to the fixed version containing the commit that addresses the buffer leak (commit reference [4]). No known public exploit code has been published [3][4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.undertow:undertow-coreMaven | < 2.0.40 | 2.0.40 |
io.undertow:undertow-coreMaven | >= 2.2.0, < 2.2.10 | 2.2.10 |
Affected products
2- Undertow/Undertowdescription
Patches
1c7e84a0b7efc[UNDERTOW-1935] - buffer leak on incoming websocket PONG message
1 file changed · +2 −0
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java+2 −0 modified@@ -152,6 +152,8 @@ public void run() { } } }); + } else { + bufferedBinaryMessage.getData().free(); } }
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- github.com/advisories/GHSA-fj7c-vg2v-ccrmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-3690ghsaADVISORY
- access.redhat.com/security/cve/CVE-2021-3690ghsax_refsource_MISCWEB
- access.redhat.com/security/cve/cve-2021-3690ghsaWEB
- bugzilla.redhat.com/show_bug.cgighsax_refsource_MISCWEB
- github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877ghsax_refsource_MISCWEB
- issues.redhat.com/browse/UNDERTOW-1935ghsax_refsource_MISCWEB
- www.mend.io/vulnerability-database/CVE-2021-3690ghsaWEB
News mentions
0No linked articles in our index yet.