CVE-2025-8671

7.5 HIGH
Published: August 13, 2025 Modified: November 04, 2025

Description

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2025/08/13/6
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2025/09/18/1
Source: af854a3a-2127-422b-91ae-364da2661108
https://deepness-lab.org/publications/madeyoureset/
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/Kong/kong/discussions/14731
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/envoyproxy/envoy/issues/40739
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/varnish/hitch/issues/397
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.kb.cert.org/vuls/id/767506
Source: af854a3a-2127-422b-91ae-364da2661108
https://gitlab.isc.org/isc-projects/bind9/-/issues/5325
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
0.2%
37th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)