CVE-2026-25667

ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0.11 allows a remote attacker to cause excessive CPU consumption by sending a crafted QUIC packet, because of an incorrect exit condition for HTTP/3 Encoder/Decoder stream processing.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*

History

14 Apr 2026, 20:47

Type Values Removed Values Added
First Time Microsoft .net
Microsoft
CPE cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
References () https://github.com/IsaJafarov/Kestrel-DoS - () https://github.com/IsaJafarov/Kestrel-DoS - Exploit, Third Party Advisory
References () https://github.com/dotnet/aspnetcore/commit/96ccc40a0e095424b19506e8268b9b1a3e23d6a7#diff-667d5b3693f93a0f706ab211428998b210862f9b885d917104d2013118312626 - () https://github.com/dotnet/aspnetcore/commit/96ccc40a0e095424b19506e8268b9b1a3e23d6a7#diff-667d5b3693f93a0f706ab211428998b210862f9b885d917104d2013118312626 - Patch

24 Mar 2026, 02:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-400
Summary
  • (es) ASP.NET Core Kestrel en Microsoft .NET 8.0 antes de 8.0.22 y .NET 9.0 antes de 9.0.11 permite a un atacante remoto causar un consumo excesivo de CPU mediante el envío de un paquete QUIC manipulado, debido a una condición de salida incorrecta para el procesamiento de flujo del codificador/decodificador HTTP/3.

19 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 19:16

Updated : 2026-04-14 20:47


NVD link : CVE-2026-25667

Mitre link : CVE-2026-25667

CVE.ORG link : CVE-2026-25667


JSON object : View

Products Affected

microsoft

  • .net
CWE
CWE-400

Uncontrolled Resource Consumption