Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks

Posted on August 16, 2025August 16, 2025 By CWS

F5 Networks has disclosed a brand new HTTP/2 vulnerability affecting a number of BIG-IP merchandise that would permit distant attackers to launch denial-of-service assaults towards company networks.

The safety flaw, designated CVE-2025-54500 and dubbed the “HTTP/2 MadeYouReset Assault,” was printed on August 13, 2025, with updates launched on August 15.

The vulnerability exploits malformed HTTP/2 management frames to overwhelm methods and has been assigned a medium severity ranking with CVSS scores of 5.3 (v3.1) and 6.9 (v4.0).

HTTP/2 Protocol Exploit Uncovered

The newly found vulnerability represents a big implementation flaw in how F5 merchandise deal with HTTP/2 communications.

Safety researchers have recognized that attackers can manipulate malformed HTTP/2 management frames to interrupt the utmost concurrent streams restrict, successfully bypassing built-in protocol safeguards.

The assault methodology permits distant, unauthenticated attackers to trigger substantial will increase in CPU utilization, probably main to finish denial of service on affected BIG-IP methods.

Key traits of this vulnerability embrace:

Assault Sort: HTTP/2 MadeYouReset Assault utilizing malformed management frames.

Authentication Required: None – distant, unauthenticated exploitation doable.

Major Impression: CPU useful resource exhaustion resulting in denial of service.

Classification: CWE-770 (Allocation of Assets With out Limits or Throttling).

Publicity Degree: Knowledge aircraft solely, no management aircraft compromise.

F5 Inside IDs: 1937817 (BIG-IP), 1937817-5 (BIG-IP Subsequent), 1937817-6 (Subsequent SPK/CNF/K8s).

What makes this vulnerability notably regarding is its classification underneath CWE-770: Allocation of Assets With out Limits or Throttling, indicating that the assault exploits methods’ incapability to correctly handle useful resource allocation.

Importantly, that is categorized as a knowledge aircraft challenge solely, that means there isn’t a management aircraft publicity, which limits the potential for extra extreme system compromises.

F5 Merchandise Extensively Affected

The vulnerability impacts an in depth vary of F5 merchandise, with BIG-IP methods bearing the brunt of the affect. Weak variations embrace BIG-IP 17.x (variations 17.5.0-17.5.1 and 17.1.0-17.1.2), BIG-IP 16.x (variations 16.1.0-16.1.6), and BIG-IP 15.x (variations 15.1.0-15.1.10).

F5 has launched engineering hotfixes for the 17.x and 16.x branches, particularly Hotfix-BIGIP-17.5.1.0.80.7-ENG.iso and Hotfix-BIGIP-17.1.2.2.0.259.12-ENG.iso for the 17.x collection, and Hotfix-BIGIP-16.1.6.0.27.3-ENG.iso for the 16.x collection.

BIG-IP Subsequent merchandise are additionally affected, together with variations 20.3.0 and varied SPK, CNF, and Kubernetes implementations.

Nevertheless, a number of F5 merchandise stay unaffected, together with BIG-IQ Centralized Administration, F5 Distributed Cloud companies, NGINX merchandise, F5OS methods, and F5 AI Gateway. F5 Silverline companies are susceptible solely when HTTP/2 enabled proxy configurations are in use.

F5 strongly recommends instant implementation of accessible hotfixes for affected methods, whereas acknowledging that engineering hotfixes don’t endure the intensive high quality assurance testing of standard releases.

For organizations unable to right away apply patches, F5 suggests a number of mitigation methods. The first advice is disabling HTTP/2 and reverting to HTTP the place configurations permit this variation.

Extra mitigation choices embrace implementing BIG-IP ASM/Superior WAF DoS safety profiles with TPS and stress-based attributes, together with Behavioral DoS Detection and Mitigation capabilities.

For BIG-IP Subsequent SPK, CNF, and Kubernetes deployments, directors can delete the F5SPKIngressHTTP2 Customized Useful resource the place doable.

System directors ought to monitor HTTP/2 profile statistics, looking forward to unusually excessive numbers of RST_STREAM frames despatched and WINDOW_UPDATE frames obtained, which can point out energetic exploitation makes an attempt.

F5 acknowledges safety researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel for locating and responsibly disclosing this vulnerability.

Increase your SOC and assist your workforce shield your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacks, DoS, Enabling, Fixes, HTTP2, Massive, Vulnerability

Post navigation

Previous Post: ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password
Next Post: Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

Related Posts

Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Cyber Security News
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication Cyber Security News
Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Cyber Security News
Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet Cyber Security News
New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies Cyber Security News
Microsoft 365 PDF Export LFI Vulnerability Allows Access to Sensitive Server Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News