Skip to main content

CVE-2025-29785: CWE-248: Uncaught Exception in quic-go quic-go

High
VulnerabilityCVE-2025-29785cvecve-2025-29785cwe-248
Published: Mon Jun 02 2025 (06/02/2025, 10:44:18 UTC)
Source: CVE Database V5
Vendor/Project: quic-go
Product: quic-go

Description

quic-go is an implementation of the QUIC protocol in Go. The loss recovery logic for path probe packets that was added in the v0.50.0 release can be used to trigger a nil-pointer dereference by a malicious QUIC client. In order to do so, the attacker first sends valid QUIC packets from different remote addresses (thereby triggering the newly added path validation logic: the server sends path probe packets), and then sending ACKs for packets received from the server specifically crafted to trigger the nil-pointer dereference. v0.50.1 contains a patch that fixes the vulnerability. This release contains a test that generates random sequences of sent packets (both regular and path probe packets), that was used to verify that the patch actually covers all corner cases. No known workarounds are available.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:56:53 UTC

Technical Analysis

CVE-2025-29785 is a high-severity vulnerability affecting quic-go version 0.50.0, an implementation of the QUIC protocol written in Go. The vulnerability arises from the loss recovery logic for path probe packets introduced in version 0.50.0. Specifically, a malicious QUIC client can exploit this flaw by first sending valid QUIC packets from multiple remote addresses, which triggers the server's path validation logic to send path probe packets. The attacker then sends specially crafted ACK packets acknowledging the server's packets in a manner that causes a nil-pointer dereference in the quic-go server implementation. This uncaught exception results in a crash or denial of service (DoS) condition. The vulnerability is classified under CWE-248 (Uncaught Exception), indicating that the software does not properly handle an unexpected condition, leading to a runtime error. The issue was patched in version 0.50.1, which includes tests generating random sequences of sent packets (both regular and path probe packets) to ensure coverage of corner cases. No known workarounds exist, and exploitation does not require authentication or user interaction. The CVSS v3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, no user interaction, and a high impact on availability but no impact on confidentiality or integrity. No known exploits are currently observed in the wild.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to services and applications that utilize quic-go version 0.50.0 for QUIC protocol communication. Since QUIC is increasingly used to improve web performance and security, particularly in HTTP/3 implementations, affected servers could be forced into denial of service by remote attackers, leading to service outages and degraded user experience. This can impact critical web services, APIs, and real-time communication platforms relying on quic-go. The availability disruption could affect e-commerce, financial services, healthcare, and government portals, potentially causing operational downtime and reputational damage. Given the lack of known workarounds, organizations must prioritize patching. The vulnerability does not directly expose data confidentiality or integrity but can be leveraged as part of a broader attack strategy to disrupt services or as a vector for further exploitation if combined with other vulnerabilities.

Mitigation Recommendations

European organizations should immediately identify any deployments of quic-go version 0.50.0 within their infrastructure, including embedded systems, microservices, and cloud-native applications. The primary mitigation is to upgrade to quic-go version 0.50.1 or later, which contains the patch addressing this vulnerability. Since no workarounds exist, patching is critical. Organizations should also implement network-level protections such as rate limiting and anomaly detection to identify unusual patterns of QUIC traffic, especially from multiple remote addresses that could indicate attempts to trigger path validation logic. Monitoring logs for unexpected crashes or exceptions in services using quic-go can help detect exploitation attempts. Additionally, applying strict ingress filtering and employing Web Application Firewalls (WAFs) capable of inspecting QUIC traffic may reduce exposure. For critical services, consider deploying redundancy and failover mechanisms to mitigate potential downtime caused by exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-03-11T14:23:00.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683d94ca182aa0cae24279ef

Added to database: 6/2/2025, 12:10:50 PM

Last enriched: 7/9/2025, 12:56:53 PM

Last updated: 8/12/2025, 9:19:13 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats