How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) published on October 10, 2023. It enables highly efficient denial-of-service attacks against HTTP/2 servers. This critical flaw affects virtually all HTTP/2 implementations.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack (CVE-2023-44487) exploits a flaw in the HTTP/2 protocol's stream cancellation mechanism. Attackers rapidly open and reset thousands of streams on a single connection, overwhelming server resources. This bypasses typical rate limits and connection-based defenses, leading to a denial of service.
Impact and Risks for your Infrastructure
This vulnerability allows attackers to launch massive DDoS attacks with minimal resources, severely impacting service availability. Businesses face significant downtime, revenue loss, and reputational damage due to overwhelmed infrastructure. Critical services relying on HTTP/2 are at high risk.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server software to the latest patched versions. For Nginx, upgrade to 1.25.3+ or 1.24.0+. For nghttp2, update to 1.57.0+. Apply vendor-specific patches for other affected implementations and verify the update by checking your server version.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.