7.5 CVE-2025-8671

Enriched by CISA Exploit
 

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
https://nvd.nist.gov/vuln/detail/CVE-2025-8671

Categories

CWE-404 : Improper Resource Shutdown or Release
When a resource is created or allocated, the developer is responsible for properly releasing the resource as well as accounting for all potential paths of expiration or invalidation, such as a set period of time or revocation.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
SUSE Linux Enterprise Module for Development Tools
  • 15 SP2 < 15-SP5 [affected]
SUSE Linux Enterprise High Performance Computing (HPC)
  • 15 < 15 SP5 [affected]
Varnish Software Varnish Enterprise
  • 6.0.x ≤ 6.0.14r4 [affected]
Varnish Software Varnish Cache
  • 6.0LTS ≤ 6.014 [affected]
Varnish Software Varnish Cache
  • 5.x ≤ 7.71 [affected]
Fastly H20
  • 579ecfa [affected]
Wind River Linux
  • LTS22 ≤ TLS25 [affected]
SUSE Linux Enterprise Desktop
  • 15 SP6 < 15 SP7 [affected]
SUSE Linux Enterprise High Performance Computing
  • 15 SP3 < 15 SP7 [affected]
SUSE Linux Enterprise Module for Dev Tools
  • 15 SP3 < 15 SP7 [affected]
SUSE Linux Enterprise Module for Package Hub
  • 15 SP5 < 15 SP7 [affected]
SUSE Linux Enterprise Server
  • 12 SP5 < 15 SP7 [affected]
SUSE Linux Enterprise Server for SAP Applications
  • 15 SP6 < 15 SP7 [affected]
SUSE Linux SUSE Manager Server
  • 4.3 [affected]
SUSE Linux SUSE Manager Server LTS
  • 4.3 [affected]
SUSE Linux SUSE Manager Proxy
  • 4.3 [affected]
SUSE Linux SUSE Manager Retail Branch Server
  • 4.3 [affected]
SUSE Linux openSUSE Leap
  • 15.6 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/mysara2022/CVE-2025-8671-vulnerability-POC-

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
125 Flooding
Medium
130 Excessive Allocation
Medium
131 Resource Leak Exposure
Medium
494 TCP Fragmentation
495 UDP Fragmentation
496 ICMP Fragmentation
666 BlueSmacking
Medium


MITRE


Techniques

id description
T1498.001 Network Denial of Service: Direct Network Flood
T1499 Endpoint Denial of Service
T1499.001 Endpoint Denial of Service: OS Exhaustion Flood
T1499.003 Endpoint Denial of Service:Application Exhaustion Flood
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1037 When flood volumes exceed the capacity of the network connection being targeted, it is typically necessary to intercept the incoming traffic upstream to filter out the attack traffic from the legitimate traffic. Such defenses can be provided by the hosting Internet Service Provider (ISP) or by a 3rd party such as a Content Delivery Network (CDN) or providers specializing in DoS mitigations. Depending on flood volume, on-premises filtering may be possible by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. As immediate response may require rapid engagement of 3rd parties, analyze the risk associated to critical resources being affected by Network DoS attacks and create a disaster recovery plan/business continuity plan to respond to incidents.
M1037 Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. To defend against SYN floods, enable SYN Cookies.
M1037 Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. To defend against SYN floods, enable SYN Cookies.
M1037 Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.