How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability impacting virtually all HTTP/2 server implementations. Published October 10, 2023, it enables highly efficient denial-of-service attacks with minimal attacker resources.
What is HTTP/2 Rapid Reset DDoS Attack?
This vulnerability exploits the HTTP/2 protocol's stream cancellation feature. Attackers rapidly open and close streams on a single connection, overwhelming server resources without completing requests. This rapid reset behavior consumes CPU and memory, leading to denial of service for affected HTTP/2 servers.
Impact and Risks for your Infrastructure
The HTTP/2 Rapid Reset attack enables extremely efficient DDoS attacks using minimal attacker resources and few connections. This can lead to severe service disruptions, website unavailability, and significant operational costs. Infrastructure can be overwhelmed by a fraction of normal traffic, causing widespread outages.
Step-by-Step Mitigation Guide
Mitigate CVE-2023-44487 by immediately updating all HTTP/2 server implementations to patched versions. For Nginx, upgrade to 1.25.3+ or 1.24.0+. Consult vendor-specific advisories for other software like Apache, Node.js, or Go. Verify the fix by checking server versions and monitoring for unusual HTTP/2 stream activity.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.