
CVE-2025-7054 – Infinite loop triggered by connection ID retirement
https://notcve.org/view.php?id=CVE-2025-7054
07 Aug 2025 — Cloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames. QUIC connections possess a set of connection identifiers (IDs); see Section 5.1 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Eac... • https://github.com/cloudflare/quiche/security/advisories/GHSA-m3hh-f9gh-74c2 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2025-4821 – Incorrect congestion window growth by invalid ACK ranges
https://notcve.org/view.php?id=CVE-2025-4821
18 Jun 2025 — Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support. An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames covering a large range of packet numbers (including packet numbers that had... • https://github.com/cloudflare/quiche/security/advisories/GHSA-6m38-4r9r-5c4m • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2025-4820 – Incorrect congestion window growth by optimistic ACK
https://notcve.org/view.php?id=CVE-2025-4820
18 Jun 2025 — Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support. An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames exercising an opportunistic ACK attack; see RFC 9000 Section 21.4. The vict... • https://github.com/cloudflare/quiche/security/advisories/GHSA-2v9p-3p3h-w56j • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2024-1410 – Unbounded storage of information related to connection ID retirement, in quiche
https://notcve.org/view.php?id=CVE-2024-1410
12 Mar 2024 — Cloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see RFC 9000 Section 5.1 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Endpoints declare the number of active connection IDs they are willing to support using the active_connection_id_limit transport parameter. The peer can create new IDs using a NEW_CO... • https://github.com/cloudflare/quiche/security/advisories/GHSA-xhg9-xwch-vr7x • CWE-400: Uncontrolled Resource Consumption •

CVE-2024-1765 – Unlimited resource allocation by QUIC CRYPTO frames flooding in quiche
https://notcve.org/view.php?id=CVE-2024-1765
12 Mar 2024 — Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client. A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake. Exploitation was possible for the duration of the connection which could be extended by the attacker. quiche 0.19.2 and 0.20.1 are the earl... • https://github.com/cloudflare/quiche/security/advisories/GHSA-78wx-jg4j-5j6g • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2023-6193 – Unbounded queuing of path validation messages in cloudflare-quiche
https://notcve.org/view.php?id=CVE-2023-6193
12 Dec 2023 — quiche v. 0.15.0 through 0.19.0 was discovered to be vulnerable to unbounded queuing of path validation messages, which could lead to excessive resource consumption. QUIC path validation (RFC 9000 Section 8.2) requires that the recipient of a PATH_CHALLENGE frame responds by sending a PATH_RESPONSE. An unauthenticated remote attacker can exploit the vulnerability by sending PATH_CHALLENGE frames and manipulating the connection (e.g. by restricting the peer's congestion window size) so that PATH_RESPONSE fra... • https://datatracker.ietf.org/doc/html/rfc9000#section-8.2 • CWE-400: Uncontrolled Resource Consumption •