CVE-2025-7054
BaseFortify
Publication date: 2025-08-07
Last updated on: 2025-08-14
Assigner: Cloudflare, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cloudflare | quiche | From 0.15.0 (inc) to 0.24.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-835 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Cloudflare quiche involves an infinite loop triggered when sending packets containing RETIRE_CONNECTION_ID frames. QUIC connections use connection IDs with sequence numbers to synchronize peers. An attacker can complete a handshake and send specially crafted frames that cause the victim to attempt retiring a connection ID in a way that violates protocol rules, leading to an infinite loop in the quiche implementation. This happens because the packet contains a frame that retires itself, which is not allowed, causing unintentional behavior in quiche's design for connection ID retirement across multiple paths.
How can this vulnerability impact me? :
This vulnerability can cause a denial of service by triggering an infinite loop in the affected quiche implementation. An unauthenticated remote attacker can exploit this to disrupt the normal operation of the QUIC connection, potentially leading to service unavailability or degraded performance.