CVE-2026-25667
March 19, 2026
ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0.11 allows a remote attacker to cause excessive CPU consumption by sending a crafted QUIC packet, because of an incorrect exit condition for HTTP/3 Encoder/Decoder stream processing.
Affected Packages
https://github.com/dotnet/aspnetcore.git (GITHUB):
Affected version(s) >=v8.0.0 <v8.0.22Fix Suggestion:
Update to version v8.0.22https://github.com/dotnet/aspnetcore.git (GITHUB):
Affected version(s) >=v9.0.0 <v9.0.11Fix Suggestion:
Update to version v9.0.11Microsoft.AspNetCore.Server.Kestrel.Core (NUGET):
Affected version(s) >=2.0.0 <2.3.6Fix Suggestion:
Update to version 2.3.6Related ResourcesĀ (2)
Do you need more information?
Contact UsCVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Uncontrolled Resource Consumption
EPSS
Base Score:
0.14