How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) affecting virtually all HTTP/2 server implementations. Published on October 10, 2023, this critical flaw enables highly efficient denial-of-service attacks.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a design flaw in the protocol's stream cancellation mechanism. Attackers repeatedly send new streams and immediately cancel them, creating a massive backlog of server-side processing without fully completing requests. This overwhelms server resources, making it highly susceptible to denial-of-service.
Impact and Risks for your Infrastructure
This vulnerability allows attackers to launch devastating DDoS attacks with minimal resources, potentially taking down critical services. Businesses face significant operational disruption, revenue loss, and reputational damage due to service unavailability. Infrastructure can be overwhelmed, leading to costly resource scaling or complete outages.
Step-by-Step Mitigation Guide
To mitigate, update your HTTP/2 server software to the latest patched versions, such as Nginx 1.25.3+ or nghttp2 1.57.0+. Consult your vendor's specific advisories for patches. Verify the fix by checking your server's version number and monitoring for unusual traffic patterns or resource spikes.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.