Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New QUIC-LEAK Vulnerability Let Attackers Exhaust Server Memory and Trigger DoS Attack

Posted on August 21, 2025August 21, 2025 By CWS

A essential pre-handshake vulnerability within the LSQUIC QUIC implementation that enables distant attackers to crash servers by reminiscence exhaustion assaults. 

The vulnerability, designated CVE-2025-54939 and dubbed “QUIC-LEAK,” impacts the second most generally used QUIC implementation globally, probably impacting over 34% of HTTP/3-enabled web sites that depend on LiteSpeed applied sciences.

Key Takeaways1. CVE-2025-54939 permits distant DoS through reminiscence exhaustion in QUIC servers.2. Impacts 14% of internet sites utilizing LSQUIC/LiteSpeed applied sciences.3. Improve instantly.

QUIC-LEAK Vulnerability

Imperva reviews that QUIC-LEAK exploits a basic weak spot in how LSQUIC handles coalesced packets inside UDP datagrams earlier than connection handshakes are established. 

The vulnerability happens when attackers craft malicious UDP datagrams containing a number of QUIC Preliminary packets, the place solely the primary packet incorporates a sound Vacation spot Connection ID (DCID) whereas subsequent packets use invalid DCIDs.

Within the susceptible code path inside lsquic_engine.c, the implementation accurately identifies and ignores packets with mismatched DCIDs, including their dimension to a rubbish depend for amplification assault safety. 

Weak code

Nonetheless, the essential flaw lies within the failure to correctly deallocate the packet_in buildings utilizing the lsquic_mm_put_packet_in operate, creating persistent reminiscence leaks.

Every leaked packet_in construction consumes roughly 96 bytes of RAM, and with UDP datagrams able to carrying as much as 10 coalesced packets, attackers can obtain reminiscence progress at roughly 70% of their bandwidth charge. 

The assault bypasses all normal QUIC connection-level protections—together with connection limits, stream controls, and circulate regulation—since these safeguards solely activate after handshake completion.

Threat FactorsDetailsAffected Merchandise– LSQUIC library (variations ImpactRemote Denial of Service (DoS)Exploit Conditions– Community entry to focus on server- Means to ship UDP packets- No authentication required- No legitimate QUIC session needed- Pre-handshake exploitationCVSS 3.1 Score7.5 (Excessive)

Mitigations

The vulnerability carries a CVSS 3.1 base rating of seven.5, with researchers noting that the supply impression ought to be labeled as Excessive as a result of potential for full service disruption. 

LiteSpeed servers, which energy over 14% of all web sites globally, are notably susceptible since they combine the affected LSQUIC library instantly.

Affect of QUIC-LEAK on a Lite Velocity net server 

Throughout managed testing utilizing a 512 MiB reminiscence configuration, researchers demonstrated that the assault may render OpenLiteSpeed servers utterly unresponsive when reminiscence utilization reached 100%. 

The assault’s effectiveness stems from its stateless nature—requiring no legitimate QUIC session institution or timing dependencies.

Quick mitigation requires upgrading to LSQUIC model 4.3.1 or later, which is included in OpenLiteSpeed 1.8.4 and LiteSpeed Net Server 6.3.4. 

Organizations unable to improve instantly ought to implement network-level UDP site visitors filtering, implement strict reminiscence utilization limits on uncovered providers, and keep steady monitoring for anomalous site visitors patterns focusing on QUIC endpoints.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and minimize incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Attack, Attackers, DoS, Exhaust, Memory, QUICLEAK, Server, Trigger, Vulnerability

Post navigation

Previous Post: Scattered Spider Hacker Sentenced to Prison
Next Post: APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task

Related Posts

UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News
Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Cyber Security News
5,000+ Fake Online Pharmacies Websites Selling Counterfeit Medicines Cyber Security News
Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets Cyber Security News
Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code Cyber Security News
Auditing Data Access Controls for Privacy Regulation Adherence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News