CVE-2025-55163

Source
https://cve.org/CVERecord?id=CVE-2025-55163
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-55163.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-55163
Aliases
Downstream
Related
Published
2025-08-13T14:17:36.111Z
Modified
2026-02-03T07:40:13.359350Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Netty MadeYouReset HTTP/2 DDoS Vulnerability
Details

Netty is an asynchronous, event-driven network application framework. Prior to versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit - which results in resource exhaustion and distributed denial of service. This issue has been patched in versions 4.1.124.Final and 4.2.4.Final.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/55xxx/CVE-2025-55163.json",
    "cwe_ids": [
        "CWE-770"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/netty/netty

Affected ranges

Type
GIT
Repo
https://github.com/netty/netty
Events

Affected versions

netty-4.*
netty-4.2.0.Final
netty-4.2.1.Final
netty-4.2.2.Final
netty-4.2.3.Final

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-55163.json"