A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-24560 A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Nov 2025 07:30:00 +0900


Tue, 04 Nov 2025 05:30:00 +0900

Type Values Removed Values Added
References

Mon, 18 Aug 2025 00:30:00 +0900


Thu, 14 Aug 2025 15:30:00 +0900


Thu, 14 Aug 2025 05:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-404
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Aug 2025 04:30:00 +0900

Type Values Removed Values Added
References

Thu, 14 Aug 2025 01:00:00 +0900

Type Values Removed Values Added
References

Thu, 14 Aug 2025 00:45:00 +0900

Type Values Removed Values Added
References

Wed, 13 Aug 2025 23:30:00 +0900

Type Values Removed Values Added
References

Wed, 13 Aug 2025 23:15:00 +0900


Wed, 13 Aug 2025 23:00:00 +0900

Type Values Removed Values Added
References

Wed, 13 Aug 2025 22:45:00 +0900

Type Values Removed Values Added
References

Wed, 13 Aug 2025 22:30:00 +0900


Wed, 13 Aug 2025 21:30:00 +0900

Type Values Removed Values Added
Description A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
Title CVE-2025-8671
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2025-11-04T21:15:08.215Z

Reserved: 2025-08-06T11:52:46.667Z

Link: CVE-2025-8671

cve-icon Vulnrichment

Updated: 2025-11-04T21:15:08.215Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T13:15:34.790

Modified: 2025-11-04T22:16:44.813

Link: CVE-2025-8671

cve-icon Redhat

Severity :

Publid Date: 2025-08-13T12:03:37Z

Links: CVE-2025-8671 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses