Impact
A remote attacker can send a flood of HTTP/2 CONTINUATION frames that bypass existing size limits by using zero-byte frames, causing the Netty server to consume excessive CPU resources and become unresponsive. This is a resource exhaustion flaw identified as CWE-770.
Affected Systems
Netty versions prior to 4.1.132.Final and 4.2.10.Final are affected.
Risk and Exploitability
The vulnerability has a CVSS score of 8.7, indicating high severity, but the EPSS score is below 1%, suggesting low likelihood of widespread exploitation. It is not listed in the CISA KEV catalog. The attack vector is remote, requiring only network access to an HTTP/2-enabled Netty server, and can be performed with minimal bandwidth.
OpenCVE Enrichment
Github GHSA