Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New HTTP/2 Vulnerability: "MadeYouReset" Allows for Large-Scale Denial-of-Service Attacks


Discover how the latest HTTP/2 vulnerability, "MadeYouReset", can be exploited by attackers to carry out large-scale denial-of-service (DoS) attacks. Read more about this emerging threat and learn how to protect yourself and your organization.

  • The "MadeYouReset" vulnerability has been discovered in the HTTP/2 protocol, allowing for denial-of-service (DoS) attacks that can overwhelm servers with an unprecedented volume of requests.
  • The vulnerability exploits a specific combination of factors within the HTTP/2 protocol, including WINDOW_UPDATE frames, PRIORITY frames, and HEADERS frames.
  • Attacks work by sending valid requests, followed by WINDOWUPDATE frames that incrementally update the window size beyond its maximum capacity, causing the server to reset the stream prematurely.
  • The impact of this vulnerability can lead to resource exhaustion on targeted servers, potentially causing "out-of-memory" crashes.
  • Researchers have assigned a generic CVE identifier (CVE-2025-8671) to the vulnerability, and experts are urging users to apply available patches and updates as soon as possible.



  • In a recent development that has left cybersecurity experts and researchers abuzz, a new vulnerability known as "MadeYouReset" has been discovered in the HTTP/2 protocol. This vulnerability, which was identified by researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel, allows for the creation of denial-of-service (DoS) attacks that can potentially overwhelm servers with an unprecedented volume of requests.

    According to experts, the MadeYouReset vulnerability exploits a specific combination of factors within the HTTP/2 protocol, which includes the use of WINDOW_UPDATE frames, PRIORITY frames, and HEADERS frames. By carefully crafting these frames in order to trigger certain conditions, attackers can cause the server to reset the stream prematurely, thereby exhausting its resources.

    The attack works by first sending a valid request that triggers an error response from the server. This error response is then followed by a series of WINDOW_UPDATE frames that incrementally update the window size beyond its maximum capacity. These frames are crafted in such a way as to trigger a protocol violation that, when combined with the initial error response, causes the server to emit an RST_STREAM frame.

    The impact of this vulnerability extends far beyond simply causing temporary disruption to servers and applications. According to researchers, if left unchecked, it can lead to resource exhaustion on the part of the targeted server. This is because, under certain conditions, the attacker's carefully crafted frames may cause the server to enter a state known as "out-of-memory" crashes.

    The discovery of this vulnerability serves as yet another reminder that even seemingly secure protocols such as HTTP/2 can be vulnerable to attack. Furthermore, it highlights the ongoing importance of staying vigilant and proactive when it comes to identifying and addressing potential vulnerabilities in our increasingly interconnected digital world.

    Researchers have assigned a generic CVE identifier, CVE-2025-8671, to this vulnerability, although it is expected that multiple products, including Apache Tomcat, F5 BIG-IP, and Netty, will likely be impacted by this discovery.

    As with any newly discovered security vulnerability, the response from industry leaders is swift and decisive. Experts are urging users of affected products to take immediate action in order to mitigate their risk exposure. This includes applying available patches and updates as soon as they become available, monitoring system logs for potential signs of attack, and maintaining up-to-date knowledge of emerging threats.

    The rise of vulnerabilities like the one described here underscores the critical need for ongoing investment in cybersecurity research and development. By supporting initiatives such as these researchers are able to identify and address potential vulnerabilities before they can be exploited by malicious actors.

    As with any threat, it's never too late to prepare and take proactive steps to safeguard your digital assets. Keep up to date on emerging threats like the "MadeYouReset" vulnerability, and ensure you have a robust security posture in place to protect your organization from such attacks.


    Discover how the latest HTTP/2 vulnerability, "MadeYouReset", can be exploited by attackers to carry out large-scale denial-of-service (DoS) attacks. Read more about this emerging threat and learn how to protect yourself and your organization.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/New-HTTP2-Vulnerability-MadeYouReset-Allows-for-Large-Scale-Denial-of-Service-Attacks-ehn.shtml

  • https://thehackernews.com/2025/08/new-http2-madeyoureset-vulnerability.html

  • https://www.securityweek.com/madeyoureset-http2-vulnerability-enables-massive-ddos-attacks/


  • Published: Thu Aug 14 12:32:33 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us