PT-2025-32984 · Http/2 +1 · Http/2 +1

Anat Bremler-Barr

+2

·

Published

2025-08-13

·

Updated

2025-10-24

·

CVE-2025-8671

CVSS v2.0
7.8
VectorAV:N/AC:L/Au:N/C:N/I:N/A:C
Name of the Vulnerable Software and Affected Versions
Varnish Cache (affected versions not specified) Apache Tomcat (affected versions not specified) Netty (affected versions not specified) F5 BIG-IP (affected versions not specified) Fastly (affected versions not specified) gRPC (affected versions not specified) Mozilla (affected versions not specified) Suse Linux (affected versions not specified) Wind River (affected versions not specified) Zephyr Project (affected versions not specified) H2O (affected versions not specified) IBM (affected versions not specified) Jetty (affected versions not specified)
Description
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption, leading to a denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues, allowing a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This vulnerability, also known as “MadeYouReset” (CVE-2025-8671), bypasses existing Rapid Reset mitigations. Approximately 99.6K+ services are potentially affected yearly.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

DoS

Improper Resource Release

Weakness Enumeration

Related Identifiers

BDU:2025-09848
CVE-2025-8671
GHSA-MRJM-QQ9M-9MJQ
MGASA-2025-0239
OESA-2025-2166
OESA-2025-2167
OESA-2025-2185
OESA-2025-2186
OESA-2025-2187
OESA-2025-2188
OESA-2025-2189
OESA-2025-2238
OESA-2025-2253
RUSTSEC-2025-0070

Affected Products

Debian
Http/2