
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A hash collision vulnerability was discovered in Kwik before version 0.10.1 (CVE-2025-23020). The vulnerability exists in the hash table used to manage connections, which allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs) (QUIC Advisory).
The vulnerability stems from the implementation of hash tables used to manage QUIC connections. The hash table implementation uses weak hash functions for performance reasons, making it susceptible to hash collisions. When an attacker sends multiple connection requests with specially crafted SCIDs that collide under the target hash function, it forces the server to spend significant computational resources processing these collisions. This can result in the server experiencing a slowdown factor of up to 300x when handling just 10,000 parallel malicious connections (QUIC Advisory).
The exploitation of this vulnerability can lead to a Denial of Service condition on affected servers. Attackers can cause significant server performance degradation with minimal effort, as the server bears the computational burden of processing colliding connection IDs. This asymmetric resource consumption allows attackers to effectively stall the server by forcing it to spend the majority of its computing power on inserting and looking up colliding connection IDs (QUIC Advisory).
The vulnerability has been fixed in Kwik version 0.10.1. Users are advised to upgrade to this version or later to mitigate the risk. The fix involves implementing more secure hash table mechanisms that are resistant to hash collision attacks (QUIC Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”