CVE-2025-55163
Netty MadeYouReset HTTP/2 DDoS Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Netty is an asynchronous, event-driven network application framework. Prior to versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit - which results in resource exhaustion and distributed denial of service. This issue has been patched in versions 4.1.124.Final and 4.2.4.Final.
Netty es un framework de aplicaciones de red asíncrono y basado en eventos. En versiones anteriores a la 4.1.124.Final y la 4.2.4.Final, Netty era vulnerable a ataques DDoS de MadeYouReset. Esta vulnerabilidad lógica del protocolo HTTP/2 utiliza tramas de control HTTP/2 malformadas para superar el límite máximo de transmisiones concurrentes, lo que provoca el agotamiento de recursos y una denegación de servicio distribuida. Este problema se ha corregido en las versiones 4.1.124.Final y la 4.2.4.Final.
A flaw was found in Netty where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
An update for Red Hat Build of Apache Camel 4.10 for Quarkus 3.20 update is now available. The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products. Issues addressed include a denial of service vulnerability.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2025-08-07 CVE Reserved
- 2025-08-13 CVE Published
- 2025-11-04 CVE Updated
- 2025-11-04 First Exploit
- 2026-04-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (3)
| URL | Tag | Source |
|---|
| URL | Date | SRC |
|---|---|---|
| https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4 | 2025-11-04 |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|---|---|
| https://access.redhat.com/security/cve/CVE-2025-55163 | 2025-10-23 | |
| https://bugzilla.redhat.com/show_bug.cgi?id=2388252 | 2025-10-23 |
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Netty Search vendor "Netty" | Netty Search vendor "Netty" for product "Netty" | < 4.1.124 Search vendor "Netty" for product "Netty" and version " < 4.1.124" | - |
Affected
| ||||||
| Netty Search vendor "Netty" | Netty Search vendor "Netty" for product "Netty" | >= 4.2.0 < 4.2.4 Search vendor "Netty" for product "Netty" and version " >= 4.2.0 < 4.2.4" | - |
Affected
| ||||||
