Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-9784

Опубликовано: 01 сент. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).

Отчет

This vulnerability is rated with an Important severity. It is simple to exploit because it does not require authentication and could result in a Denial of Service (DoS). While some DoS flaws are classified as Moderate, “MadeYouReset” is Important because of the limited barriers (no specialized tooling or advanced scripting) to exploitation, which directly impacts service availability. The vulnerability arises from an implementation weakness in HTTP/2 stream reset handling — malformed client requests can trigger server-side resets without incrementing abuse counters, allowing an attacker to bypass built-in request throttling and overhead limits. Since these resets consume CPU and memory resources and can be generated at scale over a single TCP/TLS connection, a remote attacker could exhaust server capacity quickly, impacting all legitimate clients.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 4undertow-coreAffected
Red Hat build of Apache Camel - HawtIO 4undertow-coreNot affected
Red Hat Data Grid 8undertow-coreWill not fix
Red Hat Enterprise Linux 10moditectNot affected
Red Hat Enterprise Linux 8pki-core:10.6/resteasyAffected
Red Hat Enterprise Linux 8pki-deps:10.6/resteasyAffected
Red Hat Enterprise Linux 9resteasyAffected
Red Hat Fuse 7undertow-coreWill not fix
Red Hat JBoss Enterprise Application Platform 7undertow-coreAffected
Red Hat JBoss Enterprise Application Platform 8org.jberet-jberet-parentAffected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2392306undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability

EPSS

Процентиль: 48%
0.00249
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
15 дней назад

A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).

CVSS3: 7.5
nvd
15 дней назад

A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).

CVSS3: 7.5
debian
15 дней назад

A flaw was found in Undertow where malformed client requests can trigg ...

CVSS3: 7.5
github
15 дней назад

Undertow MadeYouReset HTTP/2 DDoS Vulnerability

EPSS

Процентиль: 48%
0.00249
Низкий

7.5 High

CVSS3