How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset Attack, is a high-severity vulnerability published on October 10, 2023. This critical flaw enables highly efficient DDoS attacks by exploiting a design weakness in the HTTP/2 protocol. It affects nearly all HTTP/2 server implementations globally.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack (CVE-2023-44487) leverages the protocol's stream cancellation (RST_STREAM) feature. Attackers open numerous streams and immediately reset them, creating a large volume of server-side processing without consuming many client resources. This rapid creation and cancellation overwhelms the server's connection and request handling capacity.
Impact and Risks for your Infrastructure
This vulnerability allows attackers to launch highly efficient Distributed Denial of Service (DDoS) attacks with minimal resources. It can overwhelm critical web infrastructure, leading to service outages, significant operational disruption, and potential revenue loss for affected businesses.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server implementations to the latest patched versions immediately. For Nginx, upgrade to 1.25.3+ or 1.24.0+. Other vendors like Apache, Node.js, and Go have released specific patches; consult their advisories. Verify the fix by confirming your server's HTTP/2 library version is updated.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.