Skip to main content

CVE-2018-6346: Denial of Service (CWE-400) in Facebook Proxygen

High
VulnerabilityCVE-2018-6346cvecve-2018-6346cwe-400
Published: Mon Dec 31 2018 (12/31/2018, 22:00:00 UTC)
Source: CVE
Vendor/Project: Facebook
Product: Proxygen

Description

A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00.

AI-Powered Analysis

AILast updated: 07/03/2025, 08:25:41 UTC

Technical Analysis

CVE-2018-6346 is a high-severity denial-of-service (DoS) vulnerability identified in Facebook's Proxygen HTTP framework, specifically affecting versions prior to v2018.12.31.00. Proxygen is an open-source C++ HTTP framework widely used for building HTTP servers and clients, including support for HTTP/2. The vulnerability arises from improper handling of invalid HTTP/2 priority settings, particularly when a circular dependency is introduced in the priority tree. HTTP/2 allows clients to specify stream dependencies and weights to optimize resource allocation. However, if an attacker crafts HTTP/2 frames with circular dependencies, Proxygen fails to handle these correctly, leading to resource exhaustion or application crashes. This results in a denial-of-service condition where the affected server becomes unresponsive or crashes, impacting availability. The vulnerability does not affect confidentiality or integrity, as it does not allow unauthorized data access or modification. Exploitation requires no authentication or user interaction and can be triggered remotely by sending specially crafted HTTP/2 requests. The CVSS v3.1 score of 7.5 reflects the ease of remote exploitation and the high impact on availability. No known exploits have been reported in the wild, but the vulnerability remains a significant risk for systems running vulnerable Proxygen versions. The issue was publicly disclosed on December 31, 2018, and fixed in version v2018.12.31.00 and later releases.

Potential Impact

For European organizations, the primary impact of CVE-2018-6346 is service disruption due to denial-of-service attacks targeting web servers or services utilizing the vulnerable Proxygen versions. Organizations relying on Proxygen-based HTTP/2 servers may experience downtime, degraded performance, or complete service outages, affecting business continuity and user experience. This can be particularly damaging for critical infrastructure providers, financial institutions, e-commerce platforms, and public sector services where availability is paramount. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can lead to indirect financial losses, reputational damage, and regulatory scrutiny under frameworks such as GDPR if service disruptions affect user access or data processing. Additionally, attackers may use this vulnerability as part of a larger attack chain or to distract security teams while conducting other malicious activities. Given the remote and unauthenticated nature of the exploit, the threat is accessible to a wide range of attackers, increasing the risk profile for European organizations using affected Proxygen versions.

Mitigation Recommendations

To mitigate CVE-2018-6346, European organizations should: 1) Immediately upgrade all Proxygen deployments to version v2018.12.31.00 or later, where the vulnerability is patched. 2) Implement strict input validation and filtering at the HTTP/2 layer to detect and block malformed or suspicious priority frames that could indicate an attempted exploit. 3) Deploy Web Application Firewalls (WAFs) or HTTP/2-aware intrusion prevention systems capable of identifying and mitigating abnormal HTTP/2 priority dependencies. 4) Monitor server logs and network traffic for unusual HTTP/2 priority frame patterns or repeated connection resets that may signal exploitation attempts. 5) Conduct regular security assessments and penetration testing focusing on HTTP/2 implementations to identify residual weaknesses. 6) Establish incident response procedures to quickly isolate and remediate affected systems in case of a DoS attack. 7) Engage with vendors and open-source communities to stay informed about updates and patches related to Proxygen and HTTP/2 security. These steps go beyond generic advice by emphasizing proactive detection, layered defenses, and operational readiness specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2018-01-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda3f6

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/3/2025, 8:25:41 AM

Last updated: 8/13/2025, 5:37:58 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats