CVE-2025-8671

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
Configurations

No configuration.

History

17 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://deepness-lab.org/publications/madeyoureset/ -
  • () https://github.com/Kong/kong/discussions/14731 -
  • () https://github.com/envoyproxy/envoy/issues/40739 -
  • () https://github.com/varnish/hitch/issues/397 -
  • () https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/ -

13 Aug 2025, 20:15

Type Values Removed Values Added
CWE CWE-404
References () https://gitlab.isc.org/isc-projects/bind9/-/issues/5325 - () https://gitlab.isc.org/isc-projects/bind9/-/issues/5325 -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

13 Aug 2025, 19:15

Type Values Removed Values Added
References
  • {'url': 'https://github.com/jetty/jetty.project/pull/13449', 'source': 'cret@cert.org'}

13 Aug 2025, 14:15

Type Values Removed Values Added
Summary
  • (es) Una discrepancia causada por el restablecimiento de flujos enviados por el servidor, activados por el cliente, entre las especificaciones HTTP/2 y las arquitecturas internas de algunas implementaciones de HTTP/2 puede resultar en un consumo excesivo de recursos del servidor, lo que resulta en una denegación de servicio (DoS). Al abrir flujos y luego activar rápidamente el servidor para que los restablezca (mediante tramas malformadas o errores de control de flujo), un atacante puede explotar la contabilidad incorrecta de los flujos. Los flujos restablecidos por el servidor se consideran cerrados a nivel de protocolo, aunque el procesamiento del backend continúe. Esto permite que un cliente haga que el servidor gestione un número ilimitado de flujos simultáneos en una sola conexión. Esta CVE se actualizará a medida que se publiquen los detalles de los productos afectados.
References
  • {'url': 'https://github.com/galbarnahum/MadeYouReset', 'source': 'cret@cert.org'}
  • () https://galbarnahum.com/made-you-reset -
  • () https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80 -
  • () https://gitlab.isc.org/isc-projects/bind9/-/issues/5325 -
  • () https://kb.cert.org/vuls/id/767506 -
  • () https://varnish-cache.org/security/VSV00017.html -
  • () https://www.fastlystatus.com/incident/377810 -
  • () https://www.suse.com/support/kb/doc/?id=000021980 -

13 Aug 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-13 13:15

Updated : 2025-08-17 15:15


NVD link : CVE-2025-8671

Mitre link : CVE-2025-8671

CVE.ORG link : CVE-2025-8671


JSON object : View

Products Affected

No product.

CWE
CWE-404

Improper Resource Shutdown or Release