Skip to main content

CVE-2018-6347: Denial of Service (CWE-400) in Facebook Proxygen

High
VulnerabilityCVE-2018-6347cvecve-2018-6347cwe-400
Published: Mon Dec 31 2018 (12/31/2018, 22:00:00 UTC)
Source: CVE
Vendor/Project: Facebook
Product: Proxygen

Description

An issue in the Proxygen handling of HTTP2 parsing of headers/trailers can lead to a denial-of-service attack. This affects Proxygen prior to v2018.12.31.00.

AI-Powered Analysis

AILast updated: 07/03/2025, 08:25:55 UTC

Technical Analysis

CVE-2018-6347 is a high-severity vulnerability identified in Facebook's Proxygen library, specifically affecting versions prior to v2018.12.31.00. Proxygen is an open-source C++ HTTP framework that supports HTTP/1 and HTTP/2 protocols, commonly used to build HTTP servers and clients. The vulnerability arises from improper handling of HTTP/2 header and trailer parsing, which can be exploited to trigger a denial-of-service (DoS) condition. This is classified under CWE-400, indicating an uncontrolled resource consumption issue. An attacker can craft malicious HTTP/2 requests with specially formed headers or trailers that cause the Proxygen server to consume excessive resources, leading to service degradation or complete unavailability. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise. Although no known exploits have been reported in the wild, the ease of exploitation and the potential for service disruption make this a significant threat for systems relying on vulnerable Proxygen versions. The patch was released in version v2018.12.31.00, and users are strongly advised to upgrade to this or later versions to mitigate the risk.

Potential Impact

For European organizations, the primary impact of CVE-2018-6347 is the potential disruption of web services that utilize the Proxygen library for HTTP/2 communication. This can affect service availability, leading to downtime, degraded user experience, and potential loss of business continuity. Organizations in sectors such as finance, e-commerce, telecommunications, and public services that rely on HTTP/2-enabled servers built with Proxygen could face operational interruptions. Additionally, denial-of-service attacks can be leveraged as part of larger multi-vector attacks, potentially distracting security teams or serving as a smokescreen for other malicious activities. Given the vulnerability does not compromise data confidentiality or integrity directly, the risk is primarily operational and reputational. European entities with strict service-level agreements (SLAs) and regulatory requirements around uptime and availability (e.g., GDPR mandates on data availability and integrity) may face compliance challenges if services are disrupted. Furthermore, critical infrastructure providers using Proxygen-based solutions could experience cascading effects impacting dependent services.

Mitigation Recommendations

To mitigate CVE-2018-6347, European organizations should take the following specific actions: 1) Identify all instances of Proxygen in their infrastructure, including embedded systems, internal tools, and third-party applications. 2) Upgrade all affected Proxygen versions to v2018.12.31.00 or later, where the vulnerability is patched. 3) Implement network-level protections such as rate limiting and anomaly detection on HTTP/2 traffic to detect and block malformed header/trailer sequences that could trigger the DoS condition. 4) Employ Web Application Firewalls (WAFs) or HTTP/2-aware proxies capable of filtering suspicious HTTP/2 frames. 5) Monitor server resource utilization and logs for unusual spikes or error patterns indicative of exploitation attempts. 6) Conduct penetration testing and vulnerability scanning focused on HTTP/2 implementations to ensure no residual exposure. 7) Establish incident response procedures specifically addressing DoS scenarios to minimize downtime. These measures go beyond generic patching by emphasizing proactive detection and response tailored to HTTP/2 traffic and Proxygen-specific behaviors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2018-01-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda3fc

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/3/2025, 8:25:55 AM

Last updated: 7/25/2025, 7:49:20 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats