Impact
ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0.11 contains an error in the exit condition for HTTP/3 Encoder/Decoder stream processing, allowing a remote attacker to trigger excessive CPU consumption by sending a crafted QUIC packet. This results in denial of service for legitimate users and is classified under CWE‑400.
Affected Systems
Microsoft ASP.NET Core Kestrel running on .NET 8.0 versions earlier than 8.0.22 or .NET 9.0 versions earlier than 9.0.11 is affected. Systems that expose the Kestrel HTTP/3 endpoint to external networks are at risk.
Risk and Exploitability
The vulnerability has a CVSS score of 7.5, indicating moderate to high severity. Exploit probability is low, with an EPSS score of less than 1%, and it is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely by sending crafted QUIC packets to the vulnerable Kestrel instance, potentially causing prolonged CPU usage and service interruption.
OpenCVE Enrichment