CVE-2025-24947

5.3 MEDIUM

📋 TL;DR

A hash collision vulnerability in LSQUIC (LiteSpeed QUIC) before version 4.2.0 allows remote attackers to cause high CPU consumption on servers through Hash DoS attacks. Attackers can initiate connections with colliding Source Connection IDs to exploit the XXH32 hash function weakness. This affects any server using vulnerable LSQUIC implementations for QUIC protocol handling.

💻 Affected Systems

Products:
  • LSQUIC (LiteSpeed QUIC)
  • Any software using LSQUIC library
Versions: All versions before 4.2.0
Operating Systems: All operating systems running LSQUIC
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any configuration using LSQUIC's connection management with Source Connection IDs.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server resource exhaustion leading to denial of service, making the service unavailable to legitimate users.

🟠

Likely Case

Significant CPU load degradation affecting server performance and response times for QUIC connections.

🟢

If Mitigated

Minimal impact with proper rate limiting, connection limits, and updated software.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely without authentication against internet-exposed QUIC endpoints.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access to QUIC services.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted QUIC packets with colliding SCIDs. Public advisory includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.0

Vendor Advisory: https://github.com/litespeedtech/lsquic/releases/tag/v4.2.0

Restart Required: Yes

Instructions:

1. Download LSQUIC version 4.2.0 or later from GitHub. 2. Replace existing LSQUIC installation with patched version. 3. Recompile any applications using LSQUIC. 4. Restart affected services.

🔧 Temporary Workarounds

Rate limiting connections

linux

Implement connection rate limiting to reduce impact of hash collision attacks

# Use iptables for Linux: iptables -A INPUT -p udp --dport 443 -m hashlimit --hashlimit-above 100/sec --hashlimit-burst 200 --hashlimit-mode srcip --hashlimit-name quic_limit -j DROP

Connection limits

all

Configure maximum concurrent connections to limit resource consumption

# Configure in LSQUIC settings: max_connections = 10000
# Or in web server config for LiteSpeed: quicMaxConnections 10000

🧯 If You Can't Patch

  • Implement network-level rate limiting for QUIC/UDP traffic on port 443
  • Deploy DDoS protection services that can detect and mitigate hash collision attacks

🔍 How to Verify

Check if Vulnerable:

Check LSQUIC version: lsquic-config --version or examine linked library version in applications

Check Version:

lsquic-config --version || strings /path/to/lsquic/library | grep -i version

Verify Fix Applied:

Confirm version is 4.2.0 or higher and monitor CPU usage during QUIC connection spikes

📡 Detection & Monitoring

Log Indicators:

  • Unusual spike in QUIC connection attempts
  • High CPU usage by lsquic processes
  • Connection timeouts or failures

Network Indicators:

  • High volume of QUIC Initial packets from single sources
  • Pattern of similar SCID values in QUIC traffic

SIEM Query:

source="*lsquic*" AND (cpu_usage>90 OR connections>10000) OR source="firewall" AND protocol="QUIC" AND rate>100/sec

🔗 References

📤 Share & Export