How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487 (HTTP/2 Rapid Reset DDoS Attack) is a <strong>HIGH severity</strong> vulnerability with a CVSS score of 7.5/10. The HTTP/2 Rapid Reset Attack exploits the stream cancellation feature to overwhelm servers with a fraction of normal traffic, enabling massive DDoS attacks. Affected virtually all HTTP/2 implementations. Follow the step-by-step guide below to remediate this vulnerability in your infrastructure.
What is HTTP/2 Rapid Reset DDoS Attack?
HTTP/2 Rapid Reset DDoS Attack (CVE-2023-44487) affects <strong>HTTP/2 servers (nginx, Apache, Node.js, Go, AWS, Cloudflare)</strong>. The HTTP/2 Rapid Reset Attack exploits the stream cancellation feature to overwhelm servers with a fraction of normal traffic, enabling massive DDoS attacks. Affected virtually all HTTP/2 implementations. It was published on 2023-10-10 and affects <strong>All HTTP/2 server implementations (pre-patch)</strong>. The fixed version is <strong>Nginx 1.25.3+, nghttp2 1.57.0+, vendor-specific patches</strong>.
Impact and Risks for your Infrastructure
Enables extremely efficient HTTP/2 DDoS attacks using only a small number of connections. Can overwhelm servers with minimal attacker resources.
Step-by-Step Mitigation Guide
To remediate CVE-2023-44487, follow the prioritized mitigation steps: Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches. → Enable Cloudflare or CDN-level DDoS protection. → Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx. → Implement rate limiting on HTTP/2 connections at the edge. → Monitor for traffic spikes and RESET_STREAM frames. → Consider disabling HTTP/2 on exposed endpoints if not required.. Verify the fix using the verification commands below and confirm the patched version is deployed across all affected systems.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.