// For flags

CVE-2025-8671

CVE-2025-8671

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.

These are all security issues fixed in the lighttpd-1.4.80-1.1 package on the GA media of openSUSE Tumbleweed.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-08-06 CVE Reserved
  • 2025-08-13 CVE Published
  • 2025-08-17 CVE Updated
  • 2025-08-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-404: Improper Resource Shutdown or Release
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fastly
Search vendor "Fastly"
H20
Search vendor "Fastly" for product "H20"
579
Search vendor "Fastly" for product "H20" and version "579"
en
Affected
SUSE Linux
Search vendor "SUSE Linux"
SUSE Manager Server
Search vendor "SUSE Linux" for product "SUSE Manager Server"
4.3
Search vendor "SUSE Linux" for product "SUSE Manager Server" and version "4.3"
en
Affected
SUSE Linux
Search vendor "SUSE Linux"
SUSE Manager Server LTS
Search vendor "SUSE Linux" for product "SUSE Manager Server LTS"
4.3
Search vendor "SUSE Linux" for product "SUSE Manager Server LTS" and version "4.3"
en
Affected
SUSE Linux
Search vendor "SUSE Linux"
SUSE Manager Proxy
Search vendor "SUSE Linux" for product "SUSE Manager Proxy"
4.3
Search vendor "SUSE Linux" for product "SUSE Manager Proxy" and version "4.3"
en
Affected
SUSE Linux
Search vendor "SUSE Linux"
SUSE Manager Retail Branch Server
Search vendor "SUSE Linux" for product "SUSE Manager Retail Branch Server"
4.3
Search vendor "SUSE Linux" for product "SUSE Manager Retail Branch Server" and version "4.3"
en
Affected
SUSE Linux
Search vendor "SUSE Linux"
OpenSUSE Leap
Search vendor "SUSE Linux" for product "OpenSUSE Leap"
15.6
Search vendor "SUSE Linux" for product "OpenSUSE Leap" and version "15.6"
en
Affected