U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-8671 Detail

Description

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://deepness-lab.org/publications/madeyoureset/ CVE
https://galbarnahum.com/made-you-reset CERT/CC
https://github.com/Kong/kong/discussions/14731 CVE
https://github.com/envoyproxy/envoy/issues/40739 CVE
https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80 CERT/CC
https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq CERT/CC
https://github.com/varnish/hitch/issues/397 CVE
https://gitlab.isc.org/isc-projects/bind9/-/issues/5325 CERT/CC, CISA-ADP
https://kb.cert.org/vuls/id/767506 CERT/CC
https://support2.windriver.com/index.php?page=security-notices CERT/CC
https://varnish-cache.org/security/VSV00017.html CERT/CC
https://www.fastlystatus.com/incident/377810 CERT/CC
https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/ CVE
https://www.suse.com/support/kb/doc/?id=000021980 CERT/CC

Weakness Enumeration

CWE-ID CWE Name Source
CWE-404 Improper Resource Shutdown or Release CISA-ADP  

Change History

5 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-8671
NVD Published Date:
08/13/2025
NVD Last Modified:
08/17/2025
Source:
CERT/CC