κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks
άμυνα
.

New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks

15/08/2025

Security researchers have identified a new denial-of-service (DoS) vulnerability in HTTP/2 implementations, referred to as MadeYouReset (CVE-2025-8671). This discovery represents a notable escalation in the threats associated with web protocols.

Publicly disclosed on August 13, 2025, this flaw allows attackers to bypass built-in concurrency limits, overwhelming servers with unbounded concurrent requests and potentially crashing systems through resource exhaustion.

MadeYouReset builds directly on the 2023 Rapid Reset vulnerability (CVE-2023-44487), which exploited HTTP/2’s stream cancellation mechanism.

In Rapid Reset, attackers sent requests and immediately canceled them using client-initiated RST_STREAM frames, forcing servers to process responses without counting toward the MAX_CONCURRENT_STREAMS limit—typically set at 100.

This created a mismatch: streams appeared closed in the HTTP/2 layer, but backend processing continued, enabling massive DDoS attacks that peaked at over 398 million requests per second.

Mitigations for Rapid Reset focused on limiting client-sent RST_STREAM frames, effectively capping cancellations at around 100 per connection. However, MadeYouReset cleverly sidesteps this by tricking the server into issuing RST_STREAM frames instead.

HTTP/2 MadeYouReset Vulnerability

HTTP/2 uses frames transmitted over streams for requests and responses, with control frames like SETTINGS, WINDOW_UPDATE, and RST_STREAM managing behavior. The protocol’s MAX_CONCURRENT_STREAMS parameter aims to prevent overload by capping active streams.

In MadeYouReset, attackers send valid requests that the server begins processing, then trigger protocol errors via invalid control frames or sequencing violations.

This prompts the server to send RST_STREAM for errors, closing the stream in the HTTP/2 view while backend computation persists. Researchers identified six RFC-compliant primitives for inducing these server resets, applicable to any standards-adhering implementation.

Unlike malformed requests that trigger immediate rejection (e.g., 4xx errors with no backend work), these primitives ensure the server starts heavy processing before the reset. Result: attackers flood servers with requests exceeding concurrency limits, all without sending RST_STREAM themselves, evading common safeguards.

The vulnerability enables low-cost, high-impact DDoS attacks. Attackers need minimal resources—just enough bandwidth to send frames—while servers expend CPU, memory, and I/O on phantom requests. Tests show most affected systems suffer full DoS, with some crashing from out-of-memory conditions.

Impact varies by server capacity and targeted resources. Even lightweight stream overhead (parsing, state management, HPACK compression) accumulates at scale, degrading performance. Combined with botnets, this could rival Rapid Reset’s record-breaking assaults.

Affected projects include Netty (CVE-2025-55163), Apache Tomcat (CVE-2025-48989), F5 BIG-IP (CVE-2025-54500), H2O, and Swift-NIO-HTTP2. Over 100 vendors were coordinated for disclosure via CERT/CC.

Vendors recommend immediate patches: update to fixed versions and implement rate-limiting on server resets. For unpatched systems, reduce MAX_CONCURRENT_STREAMS or monitor anomalous RST_STREAM patterns.

This flaw highlights persistent asymmetries in HTTP/2, where request sending is cheap but processing is expensive. As web traffic increasingly relies on HTTP/2, ongoing protocol refinements are essential to counter evolving threats.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.
Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

This survival horror game with 96% positive reviews is at its lowest price ever on Steam, if you're quick

The Steam Autumn Sale is coming to an end, so now is the time to pick up those deals you've been thinking about. If you're still looking for a good discount to pull the trigger on, how about grabbing a horror game to get into the October spirit? Source: xda-developers.com … [Read More...]

Kuttram Purindhavan: The Guilty One OTT Release: Pasupathy’s Gripping Thriller Coming Soon

Kuttram Purindhavan: The Guilty One is an intense Tamil suspense thriller which looks at the moralities, secrets and consequences of hidden sins. Driven by Pasupathy's commanding central performance, the series looks at how one man's actions start to infect him with guilt, turmoil and moral ambiguity. A reluctant protagonist driven to desperation, the story holds out cerebral tension and internal … [Read More...]

Someone built an ESP32 handheld NES emulator as their "first embedded project," and I wish all my first projects went this well, too

My first projects don't always turn out as planned. But that's okay, you know? Because the first time is always a learning experience. It's all about getting accustomed to the situation, figuring out how to accomplish tasks, and laying a foundation for future endeavors. And I remind myself that those early projects are essential, as a way to "fail forward" and keep improving. And I love them for … [Read More...]

Tornado OTT Release Date: When and Where to Watch This British Period Drama Online?

Written and directed by John Maclean, Tornado is a British period drama movie that stars Koki in the lead role. The film revolves around Tornado, a samurai fighter, who embarks on a quest to take revenge for his father's murder and steal the gold of the loot. However, things get intense when she finally crosses paths with a crime gang led by the Sugarman and his son, Little Sugar. The movie has … [Read More...]

New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data

A newly disclosed vulnerability, named the WireTap attack, allows attackers with physical access to break the security of Intel’s Software Guard eXtensions (SGX) on modern server processors and steal sensitive information. A research paper released in October 2025 details how this method can extract cryptographic keys from supposedly secure SGX enclaves using a low-cost setup, challenging the … [Read More...]

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code

Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used game development platform.  The flaw, designated CVE-2025-59489, exposes applications built with vulnerable Unity Editor versions to unsafe file loading attacks that could enable local code execution and privilege escalation across multiple operating … [Read More...]

Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users

Microsoft has announced a significant security enhancement for Outlook users, implementing the retirement of inline SVG image support across Outlook for Web and the new Outlook for Windows platforms.  This change represents a proactive measure to strengthen email security infrastructure and protect users from potential cybersecurity threats. The rollout timeline has been strategically … [Read More...]

5 tips for setting up guest Wi-Fi that isn't a danger to your home

Having guests over is great until they ask for the Wi-Fi password. I'm then faced with the awkward dance of finding that crumpled sticky note, dictating a convoluted string of alphanumeric characters, and hoping they type it in correctly. But the real problem is how guests feel like I'm inviting a security nightmare home. Digitally, handing out my main Wi-Fi password is like giving a stranger a … [Read More...]

Acer Chromebook Plus Spin 514 review: a versatile, convertible powerhouse

A good Chromebook can sometimes be hard to find. Many ChromeOS devices are too underpowered to really do much beyond browse the web and manage your email, or they suffer from poor build quality, dim displays, or uncomfortable keyboards. But that's not the case with the new Acer Chromebook Plus Spin 514. Source: xda-developers.com … [Read More...]

Wolverine: 4 Marvel characters we'd love to see meet up with Logan

During the State of Play presentation for September 2025, Insomniac Game finally gave everyone an official first look at their upcoming Wolverine game. What was very clear from the start was that this would be different from what fans have come to expect from the studio, given their Spider-Man titles were wildly successful. For many people who love Marvel Comics, Wolverine is a character that … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • This survival horror game with 96% positive reviews is at its lowest price ever on Steam, if you're quick
  • Kuttram Purindhavan: The Guilty One OTT Release: Pasupathy’s Gripping Thriller Coming Soon
  • Someone built an ESP32 handheld NES emulator as their "first embedded project," and I wish all my first projects went this well, too
  • Tornado OTT Release Date: When and Where to Watch This British Period Drama Online?
  • New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023