Netty is an asynchronous, event-driven network application framework. Prior to versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit - which results in resource exhaustion and distributed denial of service. This issue has been patched in versions 4.1.124.Final and 4.2.4.Final.
References
Link | Resource |
---|---|
https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Sep 2025, 14:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4 - Exploit, Vendor Advisory | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Netty netty
Netty |
|
CPE | cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:* |
13 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-13 15:15
Updated : 2025-09-10 14:48
NVD link : CVE-2025-55163
Mitre link : CVE-2025-55163
CVE.ORG link : CVE-2025-55163
JSON object : View
Products Affected
netty
- netty
CWE
CWE-770
Allocation of Resources Without Limits or Throttling