Impact
A denial‑of‑service flaw occurs when an unauthenticated remote sender transmits a QUIC Initial packet that contains malformed transport parameters. The quinn implementation decodes varints with unwrap, causing a panic when truncated encoding is encountered; the panic terminates the application process, leading to a full service denial. The weakness is identified as CWE‑248, representing untrusted data causing a crash.
Affected Systems
The vulnerability affects the Quinn Rust library prior to version 0.11.14. Applications that depend on quinn 0.11.13 or earlier and do not apply the patch are at risk. No other vendors or platforms are directly affected.
Risk and Exploitability
The flaw is rated CVSS 8.7, a high severity due to its network reachability and unauthenticated nature. The Exploit Prediction Scoring System indicates a very low exploitation probability (under 1 %). Quinn is not listed in the CISA KEV catalog, suggesting no widespread known exploitation as of the last update. Attackers can trigger the vulnerability with a single malformed QUIC packet; no authentication, no privileged access required.
OpenCVE Enrichment
Github GHSA