HIGHVulnerability
Verified
Global

NVD HIGH: CVE-2026-33871 — Netty is an asynchronous, event-driven network application framework. In version...

Friday, March 27, 2026 at 08:16 PM UTC·Source: NIST NVD

Updated: Thursday, April 2, 2026 at 05:46 PM UTC

Executive Summary

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frames. The server's lack of a limit on the number of `CONTINUATION` frames, combined with a bypass of existing size-based mitigations using zero-byte frames,

Analysis

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frames. The server's lack of a limit on the number of `CONTINUATION` frames, combined with a bypass of existing size-based mitigations using zero-byte frames, allows an user to cause excessive CPU consumption with minimal bandwidth, rendering the server unresponsive. Versions 4.1.132.Final and 4.2.10.Final fix the issue. CVSS Score: 7.5. Published: 2026-03-27T20:16:34.833.

Indicators of Compromise (1)

CVE (1)
CVE-2026-33871
Source Attribution

Originally published by NIST NVD on Mar 27, 2026. Verified by: NIST.

Related Threats