How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability published on October 10, 2023. This critical flaw impacts nearly all HTTP/2 server implementations, posing a significant threat to web infrastructure.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack leverages a flaw in the protocol's stream cancellation mechanism. Attackers rapidly open and reset numerous streams within a single connection, bypassing typical rate limits. This overwhelms server resources with minimal data transfer, leading to denial of service.
Impact and Risks for your Infrastructure
This vulnerability enables highly efficient DDoS attacks, allowing attackers to disrupt services with minimal resources. It can overwhelm critical web infrastructure, leading to severe downtime, revenue loss, and reputational damage for affected organizations.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server software immediately. For Nginx, upgrade to version 1.25.3 or higher; for nghttp2, update to 1.57.0+. Consult your specific vendor's advisories for patches and verify the update by checking your server version.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.