// For flags

CVE-2025-55163

Netty MadeYouReset HTTP/2 DDoS Vulnerability

Severity Score

8.2
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Netty is an asynchronous, event-driven network application framework. Prior to versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit - which results in resource exhaustion and distributed denial of service. This issue has been patched in versions 4.1.124.Final and 4.2.4.Final.

Netty es un framework de aplicaciones de red asíncrono y basado en eventos. En versiones anteriores a la 4.1.124.Final y la 4.2.4.Final, Netty era vulnerable a ataques DDoS de MadeYouReset. Esta vulnerabilidad lógica del protocolo HTTP/2 utiliza tramas de control HTTP/2 malformadas para superar el límite máximo de transmisiones concurrentes, lo que provoca el agotamiento de recursos y una denegación de servicio distribuida. Este problema se ha corregido en las versiones 4.1.124.Final y la 4.2.4.Final.

A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).

An update for Red Hat Build of Apache Camel 4.10 for Quarkus 3.20 update is now available. The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products. Issues addressed include a denial of service vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
Present
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-08-07 CVE Reserved
  • 2025-08-13 CVE Published
  • 2025-11-04 CVE Updated
  • 2025-11-04 First Exploit
  • 2026-04-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netty
Search vendor "Netty"
Netty
Search vendor "Netty" for product "Netty"
< 4.1.124
Search vendor "Netty" for product "Netty" and version " < 4.1.124"
-
Affected
Netty
Search vendor "Netty"
Netty
Search vendor "Netty" for product "Netty"
>= 4.2.0 < 4.2.4
Search vendor "Netty" for product "Netty" and version " >= 4.2.0 < 4.2.4"
-
Affected