D(HE)at Attack
  • Summary
  • FAQ
  • Mitigations
  • PoC Code
  • Details
  • References

D(HE)at Attack

A Practical DoS Attack on the Finite Field Diffie-Hellman Key Exchange

D(HE)at is a denial-of-service (DoS) attack on the finite field Diffie-Hellman (DH) key exchange protocol that allows remote users without any privileges to trigger expensive server-side DH modular-exponentiation calculations without any significant resource (CPU) requirement on the attacker’s side.

CVE-2002-20001 was assigned to the attack and a full technical paper was published in IEEE Access. There are also additional implementation issues (CVE-2022-40735, CVE-2024-41996) that strongly influence the effect of an attack.

Cryptolyzer, ssh-audit (open source), and Scanigma (SaaS) can be used to check whether your service is affected by the D(HE)at attack.

© Szilárd Pfeiffer, 2025