
Cloud Vulnerability DB
A community-led vulnerabilities database
Cloudflare quiche, a QUIC protocol implementation, was discovered to contain a vulnerability (CVE-2025-7054) that creates an infinite loop when handling RETIRECONNECTIONID frames. The vulnerability affects versions from 0.15.0 to versions before 0.24.5, and was disclosed on August 7, 2025 (Cloudflare Advisory).
The vulnerability occurs in the QUIC connection identifier (ID) management system. After the QUIC handshake completes, the local endpoint manages connection IDs used by remote peers for packet destination. The issue specifically relates to the handling of RETIRECONNECTIONID frames, where Section 19.16 of RFC 9000 mandates that a packet's retired connection ID sequence number must not match its own connection ID sequence number. In path migration scenarios with multiple active paths, different connection IDs could trigger an unintended infinite loop in the retirement process. The vulnerability has received a CVSS 4.0 base score of 8.7 (HIGH) and a CVSS 3.1 score of 6.5 (MEDIUM) (NVD).
When successfully exploited, this vulnerability leads to a denial of service condition through an infinite loop, potentially affecting the availability of systems using the Cloudflare quiche implementation. The vulnerability requires no user interaction and can be triggered by an unauthenticated remote attacker (Cloudflare Advisory).
The vulnerability has been patched in quiche version 0.24.5. Users are advised to upgrade to this version or later to mitigate the risk (Cloudflare Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."