top of page
perceptive_background_267k.jpg

Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote at…

Published:

18 januari 2026 om 23:00:00

Alert date:

19 januari 2026 om 17:02:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Web Technologies

Quicly, an IETF QUIC protocol implementation, contains a vulnerability that allows remote attackers to perform denial-of-service attacks. The vulnerability exists in versions prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. Attackers can exploit this flaw to trigger assertion failures that crash processes using the Quicly library. The issue has been resolved in the specified commit. This affects any application or service that implements the QUIC protocol using the vulnerable Quicly library.

Technical details

Mitigation steps:

Affected products:

Quicly

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page