MadeYouReset Vulnerability

HTTP/2 Must Die

Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial-of-service (DoS) attacks.

"MadeYouReset bypasses the typical server-imposed limit of 100 concurrent HTTP/2 requests per TCP connection from a client. This limit is intended to mitigate DoS attacks by restricting the number of simultaneous requests a client can send," researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel said.

With MadeYouReset, an attacker can send many thousands of requests, creating a denial-of-service condition for legitimate users and, in some vendor implementations, escalating into out-of-memory crashes.

The vulnerability has been assigned the generic CVE identifier, CVE-2025-8671, although the issue impacts several products, including:

  • Apache Tomcat (CVE-2025-48989)

  • F5 BIG-IP (CVE-2025-54500)

  • Netty (CVE-2025-55163)

MadeYouReset is the latest flaw in HTTP/2 after Rapid Reset (CVE-2023-44487) and HTTP/2 CONTINUATION Flood that can be potentially weaponized to stage large-scale DoS attacks.

Just like how the other two attacks leverage the RST_STREAM frame and CONTINUATION frames, respectively, in the HTTP/2 protocol to pull off the attack, MadeYouReset builds upon Rapid Reset and its mitigation, which limits the number of streams a client can cancel using RST_STREAM.

HTTP/1.1 Must Die

HTTP request smuggling is a security exploit affecting the application layer protocol that abuses the inconsistency in parsing non-RFC-compliant HTTP requests by front-end and back-end servers, permitting an attacker to "smuggle" a request and sidestep security measures.

"HTTP/1.1 has a fatal flaw: Attackers can create extreme ambiguity about where one request ends, and the next request starts," PortSwigger's James Kettle said. "HTTP/2+ eliminates this ambiguity, making desync attacks virtually impossible. However, simply enabling HTTP/2 on your edge server is insufficient – it must be used for the upstream connection between your reverse proxy and origin server."

CVE Reference List

  • CVE-2025-8671: Generic identifier for MadeYouReset vulnerability.

  • CVE-2025-48989: Apache Tomcat implementation impact.

  • CVE-2025-54500: F5 BIG-IP implementation impact.

  • CVE-2025-55163: Netty implementation impact.

  • CVE-2025-32094: Related vulnerability reference.

  • CVE-2025-4366: Related vulnerability reference.

Table of CVE IDs and associated vendors provided for tracking security patches.

Previous
Previous

OAuth Redirect URI Abuse Flow

Next
Next

Cyber Security Statistics