servervulnerability reported in 'MadeYouReset' HTTP/2 feature, enabling attackers to launch Denial of Service (DoS) attacks on servers
In a recent development, security researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel have uncovered a significant flaw in the HyperText Transfer Protocol 2 (HTTP/2) implementations, allowing for massive Denial of Service (DoS) attacks. The vulnerability, officially identified as CVE-2025-8671, builds on the flaw behind last year's 'Rapid Reset' vulnerability and has been named "MadeYouReset."
The flaw affects most implementations of HTTP/2, and researchers had to notify more than one hundred vendors, including heavyweights such as Apache Tomcat, Google, IBM, Microsoft, and Fastly. Red Hat has stated that while some of its offerings include affected components, they are covered by remediation already tracked by other specific CVEs.
The MadeYouReset flaw allows an attacker to bypass concurrency limits, which would normally prevent a server from accepting requests for too much work. This could potentially lead to a complete Denial of Service or an out-of-memory (OOM) crash on most servers.
To combat this vulnerability, key mitigation approaches include prompt patching, tighter HTTP/2 frame validation and control, rate limiting, buffering hygiene, and automated detection coupled with active mitigation workflows.
Applying security patches from server vendors promptly to close the vulnerability caused by inaccurate tracking of server-sent stream resets, which lead to resource exhaustion, is crucial. Tightening HTTP/2 control-frame handling to ensure that servers properly track and limit concurrent streams and do not continue resource-intensive work after streams have been reset is also essential.
Implementing rate limits on streams and connections can prevent attackers from overwhelming the server with malformed frames or excessive stream resets. Bounding proxy buffering per stream and connection can reduce resource overuse and avoid excessive work being done for aborted client streams. Early cancellation of upstream requests once the client aborts or resets a stream can prevent lingering resource consumption on backend services.
Propagating client aborts aggressively to origin servers can stop wasted processing for requests that the client no longer expects to complete. Automated detection and response by monitoring for abusive client connections, triggering alerts, and applying automated temporary blocks or stricter limits on suspicious HTTP/2 streams can also help in mitigating the vulnerability.
Considering policies for HTTP/3 fallback, since mixing HTTP/3 and HTTP/2 can expose fallback vulnerabilities, adopting connection-fatal handling for invalid sequences and following latest draft efforts to integrate HTTP/3 stream limits into HTTP/2 may be beneficial.
Cloudflare and other major providers have incorporated defenses against this attack vector based on their past experience mitigating related HTTP/2 "Rapid Reset" attacks, effectively blocking MadeYouReset attempts on their platforms.
While Cisco has stated that it is not directly affected by the MadeYouReset vulnerability, it may be affected through the use of an affected third-party software library. The Zephyr Project has announced it has begun an investigation into the MadeYouReset flaw.
First announced in 2012, HTTP/2 brought a wealth of improvements over its first-generation predecessor, but also brought with it no small number of bugs. Despite the public availability of its successor HTTP/3 which emerged in 2019, HTTP/2 remains the most widely-used web protocol.
Thales' Imperva has suggested a range of mitigation strategies including using stricter protocol validation, deploying more rigorous stream state tracking, implementing connection-level rate controls, and deploying anomaly detection and behavioral monitoring systems.
More information on the MadeYouReset flaw can be found on the Deepness Lab blog and in the CVE. Companies such as Apache Tomcat, Fastly, and Varnish Software have announced patches for the MadeYouReset flaw. Fastly has upgraded its internal H2O fork accordingly. Mozilla has stated that many of its websites and services will need to be patched.
In light of this development, it is imperative for server administrators to take immediate action to secure their systems against the MadeYouReset vulnerability.
- AI-powered cybersecurity solutions can aid in the detection and response to the MadeYouReset flaw by actively monitoring for abusive client connections and applying automated temporary blocks or stricter limits on suspicious HTTP/2 streams.
- Companies like Apache Tomcat, Fastly, and Varnish Software have released patches to resolve the MadeYouReset vulnerability in their software implementations, improving the security of web services.
- Tightening control over HTTP/2 frame handling and properly tracking concurrent streams can prevent resource-intensive work from continuing after streams have been reset, mitigating the MadeYouReset flaw and preventing Denial of Service attacks.
- To secure data-and-cloud-computing environments, server administrators must promptly apply security patches from server vendors to close vulnerabilities, as the MadeYouReset flaw demonstrates the importance of accurate tracking and timely resolution of server-sent stream resets that can lead to resource exhaustion.