CVE-2025-54939

5.3 MEDIUM

📋 TL;DR

CVE-2025-54939 is a memory leak vulnerability in LiteSpeed's LSQUIC library that occurs when processing QUIC packets before handshake completion. This allows remote attackers to cause denial of service through resource exhaustion. Systems using LSQUIC versions before 4.3.1 for QUIC/HTTP3 implementations are affected.

💻 Affected Systems

Products:
  • LiteSpeed Web Server
  • OpenLiteSpeed
  • Applications using LSQUIC library
Versions: LSQUIC library versions before 4.3.1
Operating Systems: Linux, Unix-like systems, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with QUIC/HTTP3 enabled using LSQUIC library

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attackers can send crafted QUIC packets to exhaust server memory, leading to complete service disruption and potential system instability.

🟠

Likely Case

Targeted DoS attacks against vulnerable servers causing performance degradation and intermittent service interruptions.

🟢

If Mitigated

With proper rate limiting and memory monitoring, impact is limited to temporary performance issues.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending QUIC packets before handshake completion

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LSQUIC 4.3.1 or later

Vendor Advisory: https://blog.litespeedtech.com/2025/08/18/litespeed-security-update/

Restart Required: Yes

Instructions:

1. Update LSQUIC library to version 4.3.1 or later
2. Recompile applications using LSQUIC
3. Restart affected services
4. For LiteSpeed Web Server: Update to latest version that includes LSQUIC 4.3.1

🔧 Temporary Workarounds

Disable QUIC/HTTP3

all

Temporarily disable QUIC protocol support to prevent exploitation

# In LiteSpeed Web Server: Disable QUIC in server configuration
# In applications: Disable LSQUIC initialization or use alternative HTTP implementations

Rate Limit QUIC Packets

linux

Implement network-level rate limiting for QUIC traffic

# Example iptables rule for QUIC (UDP port 443)
iptables -A INPUT -p udp --dport 443 -m limit --limit 1000/minute -j ACCEPT
iptables -A INPUT -p udp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to limit QUIC traffic to trusted sources only
  • Deploy memory monitoring and alerting for abnormal memory consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check LSQUIC library version or application version that includes LSQUIC

Check Version:

ldd --version | grep lsquic OR check application documentation for version info

Verify Fix Applied:

Verify LSQUIC version is 4.3.1 or later and monitor memory usage during QUIC traffic

📡 Detection & Monitoring

Log Indicators:

  • Abnormal memory consumption patterns
  • QUIC connection failures before handshake
  • System out-of-memory errors

Network Indicators:

  • High volume of QUIC packets from single sources
  • QUIC packets without follow-up handshake attempts

SIEM Query:

source="*" ("out of memory" OR "OOM" OR "memory exhausted") AND ("QUIC" OR "lsquic" OR "HTTP/3")

🔗 References

📤 Share & Export