Netty DoS Vulnerability (CVE-2026-42587) Bypasses Decompression Limits
The National Vulnerability Database (NVD) reports a high-severity denial-of-service (DoS) vulnerability, CVE-2026-42587, affecting Netty, an asynchronous network application framework. The issue stems from HttpContentDecompressor and DelegatingDecompressorFrameListener (for HTTP/2), which are intended to limit decompression buffer sizes to prevent ‘decompression bomb’ attacks. While gzip and deflate encodings are properly constrained via ZlibDecoder, the NVD states that these limits are silently ignored for br (Brotli), zstd, or snappy content encodings.
Attackers can exploit this by sending a compressed payload using Content-Encoding: br instead of gzip. This bypasses the configured decompression limit, leading to unbounded memory allocation and ultimately an out-of-memory DoS condition. The NVD confirms this vulnerability is fixed in Netty versions 4.2.13.Final and 4.1.133.Final.
This isn’t theoretical; it’s a critical design flaw. An attacker doesn’t need complex exploits; they just need to know which compression algorithm to use. The CVSS score of 7.5 (High) reflects the network-exploitable nature (AV:N) with no privileges or user interaction required (PR:N, UI:N), leading directly to high availability impact (A:H). This is a textbook example of CWE-400, Uncontrolled Resource Consumption.
What This Means For You
- If your applications rely on Netty for network communication, you are exposed to a denial-of-service attack. Check your Netty versions immediately. Any application using Netty prior to 4.2.13.Final or 4.1.133.Final is vulnerable. Prioritize patching to these versions or newer to prevent an attacker from easily taking your services offline.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42587 - Netty Brotli Decompression Bomb DoS
title: CVE-2026-42587 - Netty Brotli Decompression Bomb DoS
id: scw-2026-05-13-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-42587 by sending HTTP requests with 'Content-Encoding: br' to trigger an unbounded memory allocation and potential Denial of Service. This rule specifically looks for the Brotli encoding which bypasses decompression limits in affected Netty versions.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42587/
tags:
- attack.impact
- attack.t1499
logsource:
category: webserver
detection:
selection:
cs-method:
- 'POST'
- 'PUT'
cs-uri:
- '/'
cs-uri-query|contains:
- 'Content-Encoding: br'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42587 | DoS | Netty framework versions prior to 4.2.13.Final and 4.1.133.Final |
| CVE-2026-42587 | DoS | HttpContentDecompressor component |
| CVE-2026-42587 | DoS | DelegatingDecompressorFrameListener component for HTTP/2 connections |
| CVE-2026-42587 | DoS | Bypass of maxAllocation limit with Content-Encoding: br (Brotli), zstd, or snappy |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 13, 2026 at 22:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.