How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) published on Oct 10, 2023. This critical flaw enables highly efficient denial-of-service attacks against virtually all HTTP/2 server implementations.
What is HTTP/2 Rapid Reset DDoS Attack?
This HTTP/2 Rapid Reset attack exploits a design flaw in the protocol's stream cancellation. Attackers repeatedly send and immediately cancel request streams, exhausting server resources. This rapid cycle overwhelms servers, leading to a denial of service with minimal attacker bandwidth.
Impact and Risks for your Infrastructure
This vulnerability enables extremely efficient HTTP/2 DDoS attacks, overwhelming servers with minimal attacker resources. Businesses face severe service disruptions, reputational damage, and potential financial losses due to inaccessible services and infrastructure downtime.
Step-by-Step Mitigation Guide
To fix CVE-2023-44487, update your HTTP/2 server software to patched versions. For Nginx, upgrade to 1.25.3+; for nghttp2, use 1.57.0+. Verify by checking your server's version and monitoring for unusual HTTP/2 traffic. Consult vendor advisories for specific patches.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.