top of page
perceptive_background_267k.jpg

Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote at…

Published:

18 January 2026 at 23:00:00

Alert date:

19 January 2026 at 17:02:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Web Technologies

Quicly, an IETF QUIC protocol implementation, contains a vulnerability that allows remote attackers to perform denial-of-service attacks. The vulnerability exists in versions prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. Attackers can exploit this flaw to trigger assertion failures that crash processes using the Quicly library. The issue has been resolved in the specified commit. This affects any application or service that implements the QUIC protocol using the vulnerable Quicly library.

Technical details

Mitigation steps:

Affected products:

Quicly

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page