How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) published October 10, 2023. It impacts virtually all HTTP/2 server implementations, enabling highly efficient denial-of-service attacks.
What is HTTP/2 Rapid Reset DDoS Attack?
This vulnerability exploits a flaw in the HTTP/2 protocol's stream cancellation feature. Attackers rapidly open and immediately reset streams using RST_STREAM frames. This rapid cycle overwhelms server resources, leading to a denial of service with minimal attacker traffic.
Impact and Risks for your Infrastructure
The HTTP/2 Rapid Reset attack enables potent DDoS attacks with minimal attacker resources, causing severe service disruption. This can lead to significant downtime, revenue loss, and reputational damage. Infrastructure faces resource exhaustion and potential outages.
Step-by-Step Mitigation Guide
Mitigate CVE-2023-44487 by updating HTTP/2 server implementations to patched versions. Upgrade Nginx to 1.25.3+ (or 1.24.0+) and nghttp2 to 1.57.0+. Verify your software version post-update. Consult vendor advisories for specific patches and apply them promptly.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.