How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset Attack, is a high-severity vulnerability impacting nearly all HTTP/2 server implementations. This critical flaw enables highly efficient Distributed Denial of Service (DDoS) attacks. Immediate action is required to protect your infrastructure.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the HTTP/2 protocol's stream cancellation mechanism. Attackers rapidly open numerous streams and immediately send RST_STREAM frames, resetting them before the server can process requests. This floods the server's connection and stream tables, exhausting resources with minimal attacker bandwidth.
Impact and Risks for your Infrastructure
This vulnerability enables extremely efficient DDoS attacks, allowing attackers to overwhelm servers with a fraction of normal traffic and minimal resources. The primary impact is severe service disruption, leading to downtime, loss of revenue, and reputational damage. Critical infrastructure relying on HTTP/2 is at significant risk.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server implementations to the latest patched versions. For Nginx, upgrade to 1.25.3+ or 1.24.0+. Ensure nghttp2 is updated to 1.57.0+. Verify successful application by checking your server software versions and monitoring for unusual traffic patterns or resource exhaustion.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.