How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset Attack, is a critical vulnerability published on October 10, 2023. This high-severity DDoS flaw affects virtually all HTTP/2 server implementations. It allows attackers to overwhelm servers with minimal resources.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the stream cancellation mechanism. Attackers send a request, immediately cancel it, and repeat this rapidly. This creates a massive backlog of processing work on the server without opening many new connections, leading to resource exhaustion.
Impact and Risks for your Infrastructure
This vulnerability enables highly efficient DDoS attacks, allowing attackers to disrupt services with minimal resources. It can lead to severe service outages, impacting business continuity and user access. Infrastructure can be overwhelmed, causing significant operational costs and reputational damage.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server implementations to the latest patched versions. For Nginx, upgrade to 1.25.3+; for nghttp2, update to 1.57.0+. Consult your vendor's specific advisories and apply available patches immediately to secure your systems.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.