Cloud Software Group continues to investigate any potential impact on Cloud Software Group-managed cloud services. If, as the investigation continues, any Cloud Software Group-managed services are found to be affected by this issue, Cloud Software Group will take immediate action to remediate the problem. Customers using Cloud Software Group-managed cloud services do not need to take any action.
Cloud Software Group has investigated the potential impact on customer-managed (on-premises) products. Please see the status of these products below.
Product |
Status |
NetScaler ADC |
Not impacted (all platforms) |
NetScaler Console |
Not impacted |
Citrix Endpoint Browser |
Not impacted |
XenServer |
Not impacted |
Citrix Observability |
Not impacted |
Citrix License Server |
Not impacted |
Citrix Secure Access |
Not impacted |
Citrix Secure Private Access |
Impacted if IIS is impacted. Citrix Secure Private Access uses IIS to provide web server functionality. Refer to Microsoft for more information on whether IIS is impacted by this CVE. As a precaution, customers may choose to disable HTTP/2 while awaiting further advice from Microsoft. Note that disabling HTTP/2 may have an impact on the performance of clients connecting to StoreFront.
Please see instructions below to disable HTTP/2 in IIS. |
Citrix Storefront |
Impacted if IIS is impacted. StoreFront uses IIS to provide web server functionality. Refer to Microsoft for more information on whether IIS is impacted by this CVE. As a precaution, customers may choose to disable HTTP/2 while awaiting further advice from Microsoft. Note that disabling HTTP/2 may have an impact on the performance of clients connecting to StoreFront.
Please see instructions below to disable HTTP/2 in IIS. |
Citrix Session Remote Start |
Impacted if IIS is impacted. Citrix Session Remote Start uses IIS to provide web server functionality. Refer to Microsoft for more information on whether IIS is impacted by this CVE. As a precaution, customers may choose to disable HTTP/2 while awaiting further advice from Microsoft. Note that disabling HTTP/2 may have an impact on the performance of clients connecting to StoreFront.
Please see instructions below to disable HTTP/2 in IIS. |
Citrix Workspace App |
Not impacted |
Citrix Virtual Apps and Desktops |
Not impacted |
App Layering |
Not impacted |
Instructions to disable HTTP/2 using Internet Information Services (IIS) Manager:
HTTP/2 is enabled by default in IIS 10.0+ for HTTPS connections. There are a number of ways to disable IIS.
Option 1 – Disable HTTP/2 in IIS
1. Open Internet Information Services (IIS) Manage
2. In the left hand Connections pane, navigate to the website
3. In the Actions pane, select Bindings
4. Select https then Edit
5. Select Disable HTTP/2
Option 2 – Disable HTTP/2 using netsh
You can use the command netsh with parameter disablehttp2 to disable http2.
1. Open an elevated command prompt
2. To view the current configuration, run:
netsh http show sslcert
3. To disable HTTP/2, run:
netsh http update sslcert disablehttp2=enable ipport=[IP:Port] certhash=[Certificate Hash] appid="[Application ID]"
Where [IP:Port], [Certificate Hash] and [Application ID] are taken from the current configuration.
The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). Cloud Software Group, Inc. and its subsidiaries (collectively, "Cloud SG") make no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS PAGE, YOU ACKNOWLEDGE THAT CLOUD SG SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. Cloud SG reserves the right to change or update the information on this page at any time. We accordingly recommend that you always view the latest version of this page. The information contained herein is being provided to you under the terms of your applicable customer agreement with Cloud SG. It may be used only for the purposes contemplated by such agreement. If you do not have such an agreement with Cloud SG, this information is provided under the cloud.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.
20205-08-19 | Initial Publication |
2025-08-21 | Updated instructions for disabling HTTP/2 |
Cloud Software Group is aware of the report describing the MadeYouReset HTTP/2 Vulnerability.
The MadeYouReset vulnerability (CVE‑2025‑8671) is a Distributed Denial of Service (DDoS) attack that exploits a logical flaw in the HTTP/2 protocol implementations. This vulnerability leverages malformed HTTP/2 control frames to bypass the maximum concurrent streams limit, leading to resource exhaustion and Denial of Service.
Security researcher Gal Bar Nahum reported that the vulnerability could impact multiple implementations of the HTTP/2 protocol. While the protocol considers resetting HTTP streams as closing them. In practice, these requests continue to be processed by the server. This discrepancy creates a gap between the requests the protocol deems inactive and those that are genuinely active, allowing for the exploitation of server resources.