Infinite loop triggered by connection ID retirement
Description
Cloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames.
QUIC connections possess a set of connection identifiers (IDs); see Section 5.1 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Each Connection ID has a sequence number to ensure synchronization between peers.
An unauthenticated remote attacker can exploit this vulnerability by first completing a handshake and then sending a specially-crafted set of frames that trigger a connection ID retirement in the victim. When the victim attempts to send a packet containing RETIRE_CONNECTION_ID frames, Section 19.16 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-19.6 requires that the sequence number of the retired connection ID must not be the same as the sequence number of the connection ID used by the packet. In other words, a packet cannot contain a frame that retires itself. In scenarios such as path migration, it is possible for there to be multiple active paths with different active connection IDs that could be used to retire each other. The exploit triggered an unintentional behaviour of a quiche design feature that supports retirement across paths while maintaining full connection ID synchronization, leading to an infinite loop.This issue affects quiche: from 0.15.0 before 0.24.5.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated remote attacker can trigger an infinite loop in Cloudflare quiche before 0.24.5 by sending crafted RETIRE_CONNECTION_ID frames during a QUIC connection.
Vulnerability
Description
CVE-2025-7054 is an infinite loop vulnerability in Cloudflare's quiche, which is an implementation of the QUIC transport protocol and HTTP/3. The bug occurs in the logic that handles sending packets containing RETIRE_CONNECTION_ID frames. After a QUIC handshake completes, the local endpoint is responsible for issuing and retiring connection IDs used by the remote peer. Each connection ID has a sequence number to synchronize state between peers [1][2].
Exploitation
An unauthenticated remote attacker can exploit this vulnerability by first completing a QUIC handshake with a victim running a vulnerable version of quiche. The attacker then sends a specially crafted set of frames that trigger a connection ID retirement on the victim. Per RFC 9000 Section 19.16, a packet cannot contain a RETIRE_CONNECTION_ID frame that retires the same sequence number as the connection ID used by that packet. However, in scenarios such as path migration, multiple active paths exist with different connection IDs that could be used to retire each other. The exploit triggered an unintended behavior in quiche's design feature that supports retirement across paths while maintaining full connection ID synchronization, leading to an infinite loop [2][3].
Impact
An attacker who successfully exploits this vulnerability can cause the victim's quiche endpoint to enter an infinite loop. This can effectively act as a denial-of-service (DoS) condition, preventing the affected QUIC endpoint from processing valid packets or making progress on the connection. No authentication is required beyond establishing the initial QUIC handshake.
Mitigation
The vulnerability affects quiche versions from 0.15.0 before 0.24.5. The fix was included in quiche version 0.24.5. Users should upgrade to this version or later to mitigate the risk [3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
quichecrates.io | >= 0.15.0, < 0.24.5 | 0.24.5 |
Affected products
2- Range: >=0.15.0, <0.24.5
- Cloudflare/quichev5Range: 0.15.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.