How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) published on October 10, 2023. It enables highly efficient denial-of-service attacks against virtually all HTTP/2 server implementations. This critical flaw requires immediate attention.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the protocol's stream cancellation mechanism. Attackers rapidly open and close a large number of streams within a single HTTP/2 connection. This overwhelms server resources by forcing continuous stream setup and teardown, leading to a denial of service. It affects nearly all HTTP/2 server implementations.
Impact and Risks for your Infrastructure
This vulnerability enables highly efficient DDoS attacks, requiring minimal attacker resources to overwhelm target servers. Businesses face severe service disruptions, potential data loss, and significant reputational and financial damage due to prolonged outages. Infrastructure can be rendered completely unresponsive.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server implementations to patched versions immediately. For Nginx, upgrade to 1.25.3+; for nghttp2, use 1.57.0+. Verify the fix by confirming version numbers and monitoring server performance for any signs of unusual HTTP/2 stream activity.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.