SentinelOne
CVE Vulnerability Database
Vulnerability Database/CVE-2025-55163

CVE-2025-55163: Netty HTTP/2 MadeYouReset DoS Vulnerability

CVE-2025-55163 is a denial of service vulnerability in Netty affecting HTTP/2 protocol handling through MadeYouReset attacks that cause resource exhaustion. This article covers technical details, affected versions, and patches.

Published:

CVE-2025-55163 Overview

CVE-2025-55163 is a high-severity Distributed Denial of Service (DDoS) vulnerability affecting Netty, the popular asynchronous, event-driven network application framework for Java. This vulnerability, known as "MadeYouReset," exploits a logical flaw in the HTTP/2 protocol implementation that allows attackers to bypass the maximum concurrent streams limit through malformed HTTP/2 control frames, leading to resource exhaustion and service disruption.

Critical Impact

Attackers can exploit this HTTP/2 protocol vulnerability to exhaust server resources and cause denial of service conditions, potentially affecting all applications built on vulnerable Netty versions.

Affected Products

  • Netty versions prior to 4.1.124.Final
  • Netty versions prior to 4.2.4.Final

Discovery Timeline

  • August 13, 2025 - CVE-2025-55163 published to NVD
  • November 4, 2025 - Last updated in NVD database

Technical Details for CVE-2025-55163

Vulnerability Analysis

This vulnerability stems from a logical flaw in how Netty handles HTTP/2 control frames. The HTTP/2 protocol includes a mechanism to limit the maximum number of concurrent streams a client can open, designed to prevent resource exhaustion attacks. However, the MadeYouReset attack technique exploits malformed HTTP/2 control frames to circumvent this protective limit.

When an attacker sends specially crafted malformed control frames, the Netty HTTP/2 implementation fails to properly enforce the MAX_CONCURRENT_STREAMS setting. This allows attackers to open an unlimited number of streams, consuming server memory and CPU resources until the service becomes unresponsive or crashes. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling).

Root Cause

The root cause is improper resource allocation handling in Netty's HTTP/2 codec implementation. The framework does not adequately validate and enforce stream limits when processing certain malformed control frames, allowing the protocol-level protection mechanism to be bypassed. This represents a logical error in the HTTP/2 state machine rather than a memory corruption or code execution vulnerability.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker can remotely target any Netty-based HTTP/2 server by sending a sequence of malformed HTTP/2 control frames. The attack follows this general pattern:

  1. Establish an HTTP/2 connection to the target server
  2. Send malformed control frames designed to confuse the stream accounting logic
  3. Open streams beyond the configured MAX_CONCURRENT_STREAMS limit
  4. Continue creating streams until server resources are exhausted
  5. The server experiences resource exhaustion, leading to denial of service

The attack is particularly effective because it exploits a protocol-level flaw, making it difficult to distinguish from legitimate traffic without proper frame validation. For detailed technical information about the attack mechanism, see the GitHub Security Advisory and CERT Vulnerability Note #767506.

Detection Methods for CVE-2025-55163

Indicators of Compromise

  • Abnormal increase in HTTP/2 stream creation rates from single connections
  • Memory usage spikes correlated with HTTP/2 traffic patterns
  • Unusual numbers of RST_STREAM frames or GOAWAY frames in HTTP/2 traffic
  • Server resource exhaustion events without corresponding legitimate traffic increases

Detection Strategies

  • Monitor HTTP/2 connection metrics for streams exceeding configured MAX_CONCURRENT_STREAMS limits
  • Implement network-level detection for malformed HTTP/2 control frames
  • Deploy application performance monitoring to detect resource exhaustion patterns
  • Use SentinelOne Singularity to detect anomalous process behavior and resource consumption patterns

Monitoring Recommendations

  • Enable detailed HTTP/2 frame logging on edge servers and load balancers
  • Set up alerts for sudden increases in concurrent stream counts per connection
  • Monitor server CPU and memory utilization in correlation with HTTP/2 traffic
  • Track connection reset rates and error responses from HTTP/2 services

How to Mitigate CVE-2025-55163

Immediate Actions Required

  • Upgrade Netty to version 4.1.124.Final or 4.2.4.Final immediately
  • Review all applications using Netty as a dependency and update accordingly
  • Consider implementing rate limiting at the load balancer or reverse proxy level
  • Monitor systems for signs of exploitation while patches are being applied

Patch Information

The Netty development team has released patched versions that properly enforce HTTP/2 stream limits and validate control frames. Organizations should upgrade to:

  • Netty 4.1.x branch: Update to version 4.1.124.Final or later
  • Netty 4.2.x branch: Update to version 4.2.4.Final or later

For Maven-based projects, update the Netty dependency version in your pom.xml. For Gradle projects, update the version in your build.gradle file. Detailed patch information is available in the GitHub Security Advisory.

Workarounds

  • Deploy a WAF or reverse proxy capable of HTTP/2 frame inspection and rate limiting
  • Reduce the MAX_CONCURRENT_STREAMS setting to minimize attack impact
  • Implement connection-level rate limiting at the network perimeter
  • Consider temporarily disabling HTTP/2 and falling back to HTTP/1.1 if patching is not immediately possible
bash
# Example: Configure nginx as a reverse proxy with HTTP/2 stream limits
# Add to nginx.conf server block for HTTP/2 protection
http2_max_concurrent_streams 100;
http2_max_requests 1000;
limit_conn_zone $binary_remote_addr zone=conn_limit:10m;
limit_conn conn_limit 10;

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.