CVE-2021-3690
Java vulnerability analysis and mitigation

Overview

CVE-2021-3690 is a vulnerability discovered in Undertow, where a buffer leak on incoming WebSocket PONG messages can lead to memory exhaustion. The vulnerability was reported on August 9, 2021, affecting various versions of the Undertow framework. This flaw primarily impacts applications using WebSocket implementations in Undertow, particularly those handling PONG messages (CVE Details, Red Hat CVE).

Technical details

The vulnerability occurs when a WebSocket endpoint that sends PING messages does not have a handler configured for PongMessage. This leads to a buffer leak in the WebSocket implementation, causing direct buffer memory to be exhausted over time. The issue manifests through XNIO001007 errors in server logs and can eventually cause the server to stop servicing requests. When configured with Byte Buffer Pool leak detection, the system logs buffer leak detection messages for each PONG frame received (Undertow Issue).

Impact

The primary impact of this vulnerability is on system availability. When exploited, it can lead to memory exhaustion and eventually cause a denial of service condition where the server stops servicing not only WebSocket connections but all requests. This makes the vulnerability particularly concerning for systems that rely heavily on WebSocket communications (CVE Details).

Mitigation and workarounds

A workaround exists by adding a PongMessage handler in the WebSocket endpoint's onOpen implementation. The fix involves adding the following code: session.addMessageHandler(PongMessage.class, new MessageHandler.Whole() { public void onMessage(PongMessage message) { } });. The issue has been addressed in multiple versions including Undertow 2.2.10.Final, 2.0.40.Final, and 1.4.18.SP13 (Undertow Issue, GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • org.apache.tika:tika-parser-pdf-module
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • at.yawk.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
GHSA-93fv-4pm9-xp28MEDIUM6.9
  • JavaJava
  • net.dv8tion:jda
NoYesDec 09, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management