How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a critical vulnerability impacting nearly all HTTP/2 server implementations. This high-severity flaw allows attackers to launch highly efficient denial-of-service attacks. Immediate patching is essential to protect your services.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits the stream cancellation feature (RST_STREAM frames) to overwhelm servers. Attackers open a stream, immediately reset it, and repeat this process thousands of times within a single connection. This rapid cycle exhausts server resources, leading to a denial of service with minimal attacker traffic.
Impact and Risks for your Infrastructure
This vulnerability enables extremely efficient DDoS attacks, allowing attackers to overwhelm servers with minimal resources. It can lead to severe service disruptions, website unavailability, and significant operational costs due to downtime. Unpatched systems are highly susceptible to widespread service outages.
Step-by-Step Mitigation Guide
Apply vendor-specific patches immediately. For Nginx, upgrade to version 1.25.3+ or 1.24.0+. For nghttp2, update to 1.57.0+. Verify the fix by ensuring your server software versions reflect the patched releases and monitoring for unusual HTTP/2 traffic patterns or resource spikes.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.