The Cloudflare Blog: MadeYouReset: An HTTP/2 vulnerability thwarted by Rapid Reset mitigations

Source URL: https://blog.cloudflare.com/madeyoureset-an-http-2-vulnerability-thwarted-by-rapid-reset-mitigations/
Source: The Cloudflare Blog
Title: MadeYouReset: An HTTP/2 vulnerability thwarted by Rapid Reset mitigations

Feedly Summary: A new HTTP/2 denial-of-service (DoS) vulnerability called MadeYouReset was recently disclosed by security researchers. Cloudflare HTTP DDoS mitigation, already protects from MadeYouReset.

AI Summary and Description: Yes

Summary: The text discusses a newly identified HTTP/2 DoS vulnerability named MadeYouReset (CVE-2025-8671), discovered by researchers at Tel Aviv University. It highlights how Cloudflare is already protecting its users from this threat due to proactive measures taken previously. The vulnerability underscores the importance of robust security practices, especially for web server implementations.

Detailed Description: The disclosure by Tel Aviv University outlines a significant HTTP/2 denial-of-service (DoS) vulnerability known as MadeYouReset (CVE-2025-8671). This vulnerability poses a risk primarily due to insufficient enforcement of restrictions on malformed frame submissions by clients, affecting certain unpatched HTTP/2 server implementations. Key points include:

– **Vulnerability Overview:**
– MadeYouReset exploits the HTTP/2 specification’s stream reset feature, allowing clients to cancel requests.
– Attackers can repeatedly issue resets to exhaust server resources, leading to service outages for legitimate users.

– **Comparison with Rapid Reset:**
– Rapid Reset (CVE-2023-44487) also targets the stream reset mechanism, but attackers trick servers into executing resets instead of clients doing so directly.
– The fundamental exploitation method remains similar between the two vulnerabilities—overloading the server with resets.

– **Impact and Mitigation:**
– The vulnerability predominantly affects a smaller number of HTTP/2 server implementations, as many of the most widely used implementations have already deployed mitigations against Rapid Reset.
– Cloudflare users particularly benefit from this protection, as they have implemented systems that shield against the vulnerabilities arising from both MadeYouReset and Rapid Reset.

– **Cloudflare’s Approach:**
– Cloudflare was proactive in being informed about this vulnerability in May and confirmed that their infrastructure is not susceptible due to ongoing mitigations.
– Users of Cloudflare’s open-sourced Pingora framework need to ensure they’re using the latest version of the Rust-language h2 library to prevent vulnerability exploitation.

– **Researcher Acknowledgment:**
– The text acknowledges the contributions of the researchers who identified the vulnerability and advocates a culture of collaboration with security professionals to strengthen defenses against emerging threats.

This revelation about the MadeYouReset vulnerability emphasizes the necessity for security and compliance professionals to regularly update and patch their software, monitor vulnerability disclosures, and remain engaged with security research communities to preemptively address potential exploits.