CVE-2025-9784 (CNNVD-202509-023)
HIGH
中文标题:
Red Hat Undertow 安全漏洞
英文标题:
Undertow: undertow madeyoureset http/2 ddos vulnerability
CVSS分数:
7.5
发布时间:
2025-09-02 13:37:59
漏洞类型:
其他
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v4
漏洞描述
中文描述:
Red Hat Undertow是美国红帽(Red Hat)公司的一款基于Java的嵌入式Web服务器,是Wildfly(Java应用服务器)默认的Web服务器。 Red Hat Undertow存在安全漏洞,该漏洞源于容易受到HTTP/2 DDoS攻击。
英文描述:
A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS).
CWE类型:
CWE-404
CWE-770
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Red Hat | Red Hat build of Apache Camel for Spring Boot 4 | - | - | - |
cpe:/a:redhat:camel_spring_boot:4
|
| Red Hat | Red Hat build of Apache Camel - HawtIO 4 | - | - | - |
cpe:/a:redhat:apache_camel_hawtio:4
|
| Red Hat | Red Hat Data Grid 8 | - | - | - |
cpe:/a:redhat:jboss_data_grid:8
|
| Red Hat | Red Hat Enterprise Linux 10 | - | - | - |
cpe:/o:redhat:enterprise_linux:10
|
| Red Hat | Red Hat Enterprise Linux 8 | - | - | - |
cpe:/o:redhat:enterprise_linux:8
|
| Red Hat | Red Hat Enterprise Linux 9 | - | - | - |
cpe:/o:redhat:enterprise_linux:9
|
| Red Hat | Red Hat Fuse 7 | - | - | - |
cpe:/a:redhat:jboss_fuse:7
|
| Red Hat | Red Hat JBoss Enterprise Application Platform 7 | - | - | - |
cpe:/a:redhat:jboss_enterprise_application_platform:7
|
| Red Hat | Red Hat JBoss Enterprise Application Platform 8 | - | - | - |
cpe:/a:redhat:jboss_enterprise_application_platform:8
|
| Red Hat | Red Hat JBoss Enterprise Application Platform Expansion Pack | - | - | - |
cpe:/a:redhat:jbosseapxp
|
| Red Hat | Red Hat Process Automation 7 | - | - | - |
cpe:/a:redhat:jboss_enterprise_bpms_platform:7
|
| Red Hat | Red Hat Single Sign-On 7 | - | - | - |
cpe:/a:redhat:red_hat_single_sign_on:7
|
| redhat | build_of_apache_camel_for_spring_boot | - | - | - |
cpe:2.3:a:redhat:build_of_apache_camel_for_spring_boot:-:*:*:*:*:*:*:*
|
| redhat | fuse | 7.0.0 | - | - |
cpe:2.3:a:redhat:fuse:7.0.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 7.0.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 8.0.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform_expansion_pack | - | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform_expansion_pack:-:*:*:*:*:*:*:*
|
| redhat | process_automation | 7.0 | - | - |
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
|
| redhat | single_sign-on | 7.0 | - | - |
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
|
| redhat | undertow | - | - | - |
cpe:2.3:a:redhat:undertow:-:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*
|
| redhat | enterprise_linux | 9.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
|
| Red Hat | Red Hat build of Apache Camel 4.14.2 for Spring Boot 3.5.8 | - | - | - |
cpe:/a:redhat:apache_camel_spring_boot:4.14
|
| Red Hat | Red Hat JBoss Enterprise Application Platform 8.1 | 8.0 | - | - |
cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
|
| Red Hat | Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8 | 8.1 | - | - |
cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el8
|
| Red Hat | Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 9 | 8.1 | - | - |
cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el9
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
vdb-entry
cve.org
访问
cve.org
RHBZ#2392306
issue-tracking
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
RHSA-2025:23143
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0383
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0384
vendor-advisory
cve.org
访问
cve.org
RHSA-2026:0386
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
CVSS评分详情
3.1 (cna)
HIGH
7.5
CVSS向量:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2025-09-02 13:37:59
修改时间:
2025-11-07 21:45:03
创建时间:
2025-11-11 15:40:54
更新时间:
2026-01-12 02:28:16
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-9784 |
2025-11-11 15:23:38 | 2025-11-11 07:40:54 |
| NVD | nvd_CVE-2025-9784 |
2025-11-11 15:01:01 | 2025-11-11 07:48:41 |
| CNNVD | cnnvd_CNNVD-202509-023 |
2025-11-11 15:12:55 | 2025-11-11 08:00:09 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v4
CVE
2026-01-12 02:12:35
affected_products_count: 22 → 26; references_count: 6 → 11
查看详细变更
- affected_products_count: 22 -> 26
- references_count: 6 -> 11
v3
CNNVD
2025-11-11 16:00:09
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202509-023; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202509-023
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:48:41
affected_products_count: 16 → 22; references_count: 5 → 6; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 16 -> 22
- references_count: 5 -> 6
- data_sources: ['cve'] -> ['cve', 'nvd']