How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) published on October 10, 2023. This critical flaw enables attackers to launch highly efficient denial-of-service attacks against HTTP/2 servers. It affects virtually all HTTP/2 implementations.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the protocol's stream cancellation mechanism. Attackers rapidly open and reset numerous streams within a single HTTP/2 connection. This overwhelms server resources by forcing excessive processing of stream state changes, leading to a denial of service with minimal attacker bandwidth.
Impact and Risks for your Infrastructure
This vulnerability enables highly efficient DDoS attacks, allowing attackers to overwhelm server infrastructure with minimal resources. Businesses face significant service disruptions, potential data loss from overloaded systems, and reputational damage due to prolonged outages. The high CVSS score reflects its critical potential for widespread impact.
Step-by-Step Mitigation Guide
Immediately update all HTTP/2 server implementations to patched versions. For Nginx, upgrade to 1.25.3+. For other vendors like Apache, Node.js, Go, AWS, and Cloudflare, apply their specific security updates. Verify the fix by confirming your server's HTTP/2 library or software version matches the patched release.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.