Let's see how we can help you!
Leave a message and our dedicated advisor will contact you.
Send us a message
0/10000
Leave a message and our dedicated advisor will contact you.

If you thought this would be a quiet week, I have some bad news. Security researchers have just disclosed a new, potentially catastrophic vulnerability in the HTTP/2 protocol. It has been dubbed "CONTINUATION Flood" (designated CVE-2025-43177), and it looks like it could cause a lot of trouble.
In a nutshell, the HTTP/2 protocol, which powers a significant portion of the modern internet, has a flaw. An attacker can send a series of specially crafted packets (CONTINUATION frames) to a server without a proper termination signal. The server, attempting to process this endless stream of data, consumes all available RAM and CPU power, leading to it freezing or becoming completely paralyzed.
The worst part is that a single connection and a single computer are enough to carry out such an attack. You don't need an army of botnets to take down even a powerful machine. This makes "CONTINUATION Flood" an extremely dangerous tool for conducting Denial of Service (DoS) attacks.
To better understand what's happening "under the hood," let's walk through a simplified attack scenario. Imagine a conversation between a client and a server:
HEADERS frame. Think of it as starting a letter by writing the recipient's address. However, a small technical detail is key here: the END_HEADERS flag is not set in this frame. This signals to the server, "Hey, this isn't all the headers, I'll send the rest in subsequent packets!"CONTINUATION frames. None of them have the END_HEADERS flag either.CONTINUATION frame, assembles them in memory, and waits for the end signal that never arrives. This leads to a rapid exhaustion of memory (RAM) and pushes CPU usage to 100%, ultimately causing the server to crash and resulting in a denial of service for legitimate users.The "genius" of this attack lies in using a legitimate feature of the protocol in a malicious way, making it difficult to detect with traditional security systems.
The issue affects many popular implementations of the HTTP/2 protocol. The list of vulnerable technologies includes, among others:
If you manage a web infrastructure, there's a high probability that this problem affects you too.
Fortunately, software vendors have already responded. Updates and patches that fix this critical vulnerability are now available. The recommendation is simple and straightforward: update your server software immediately! Delaying could cost you service stability and a lot of stress.
It seems we're in for a busy period of patching and securing systems. Stay vigilant!
Source: BleepingComputer
Aleksander

Chief Technology Officer at SecurHub.pl
PhD candidate in neuroscience. Psychologist and IT expert specializing in cybersecurity.
Adobe warns of a critical vulnerability, CVE-2025-54236 "SessionReaper," which allows for customer account takeover in Adobe Commerce and Magento platforms.

A review of the most dangerous cybersecurity vulnerabilities reported in the second week of September 2025—priority flaws concern Windows, Microsoft Office, Android, and ICS.
The Cl0p ransomware group exploited a zero-day in Oracle E-Business Suite (CVE-2025-61882), stealing data from multiple companies in August. Oracle just released a patch, but experts warn: check your systems now, as attacks continue.
Loading comments...