Undertow: undertow madeyoureset http/2 ddos vulnerability
Description
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Undertow's failure to track repeated stream resets from malformed requests enables a "MadeYouReset" DoS attack.
Vulnerability
Description
CVE-2025-9784 describes a denial of service (DoS) vulnerability in Undertow, an embeddable web server. The flaw, dubbed the "MadeYouReset" attack, arises because the server does not increment abuse counters when handling malformed client requests that trigger server-side stream resets [1][2]. While this is not a protocol-level bug, it exposes a common implementation weakness in the handling of HTTP/2 or similar stream-based connections where rapid resets can be exploited.
Exploitation
An unauthenticated attacker with network access to the Undertow server can repeatedly send crafted requests that cause the server to abort streams internally [3][4]. Because the server fails to register these events in its abuse counter mechanism, there is no throttling or back-pressure applied. The attacker can therefore send a high rate of such requests without being blocked.
Impact
Successful exploitation forces the Undertow server to expend resources processing each reset, leading to excessive CPU and/or memory consumption. Over time, this can degrade performance or completely exhaust server resources, resulting in a denial of service for legitimate clients. The attack does not require any special privileges or knowledge of the internal state beyond the ability to deliver network packets.
Mitigation
Red Hat has released updated packages for Red Hat Enterprise Linux and Red Hat JBoss Enterprise Application Platform (EAP) via RHSA-2026:0384, RHSA-2026:0383, RHSA-2026:3891, and RHSA-2026:3889 to address this flaw [1][2][3][4]. Administrators should apply the relevant updates to ensure the abuse counter mechanism properly tracks and limits stream resets.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.undertow:undertow-coreMaven | < 2.2.38.Final | 2.2.38.Final |
io.undertow:undertow-coreMaven | >= 2.3.0.Alpha1, < 2.3.20.Final | 2.3.20.Final |
Affected products
21.0.0.Alpha1, 1.0.0.Alpha10, 1.0.0.Alpha11, …+ 1 more
- (no CPE)range: 1.0.0.Alpha1, 1.0.0.Alpha10, 1.0.0.Alpha11, …
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- access.redhat.com/errata/RHSA-2025:23143ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:0383ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:0384ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:0386ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:3889ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:3891ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:3892ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:4915ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:4916ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:4917ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2026:4924ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-95h4-w6j8-2rp8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-9784ghsaADVISORY
- access.redhat.com/security/cve/CVE-2025-9784ghsavdb-entryx_refsource_REDHATWEB
- bugzilla.redhat.com/show_bug.cgighsaissue-trackingx_refsource_REDHATWEB
- github.com/undertow-io/undertow/pull/1778ghsaWEB
- github.com/undertow-io/undertow/pull/1802ghsaWEB
- github.com/undertow-io/undertow/pull/1803ghsaWEB
- github.com/undertow-io/undertow/pull/1804ghsaWEB
- github.com/undertow-io/undertow/pull/1805ghsaWEB
- github.com/undertow-io/undertow/releases/tag/2.2.38.FinalghsaWEB
- issues.redhat.com/browse/UNDERTOW-2598ghsaWEB
- kb.cert.org/vuls/id/767506ghsaWEB
- www.kb.cert.org/vuls/id/767506ghsaWEB
News mentions
0No linked articles in our index yet.