


Perceptive Security
SOC/SIEM Consultancy

Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote at…
Published:
18 januari 2026 om 23:00:00
Alert date:
19 januari 2026 om 17:02:27
Source:
nvd.nist.gov
Network Infrastructure, Web Technologies
Quicly, an IETF QUIC protocol implementation, contains a vulnerability that allows remote attackers to perform denial-of-service attacks. The vulnerability exists in versions prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. Attackers can exploit this flaw to trigger assertion failures that crash processes using the Quicly library. The issue has been resolved in the specified commit. This affects any application or service that implements the QUIC protocol using the vulnerable Quicly library.
Technical details
Mitigation steps:
Affected products:
Quicly
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-61684
https://github.com/h2o/quicly/commit/d9d3df6a8530a102b57d840e39b0311ce5c9e14e
https://github.com/h2o/quicly/security/advisories/GHSA-wr3c-345m-43v9
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
