"HTTP/2 implementations are vulnerable to “MadeYouReset” DoS attack through HTTP/2 control frames
MadeYouReset exploits a mismatch caused by stream resets between HTTP/2 specifications and the internal architectures of many real-world web servers. This results in resource exhaustion, and a threat actor can leverage this vulnerability to perform a distributed denial of service attack (DDoS)."
https://kb.cert.org/vuls/id/767506
#CVE_2025_8671 #infosec #cybersecurity
You must log in or # to comment.