How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset Attack, is a critical vulnerability impacting virtually all HTTP/2 server implementations. This high-severity DDoS flaw allows attackers to overwhelm servers with minimal resources, posing a significant threat to online services.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the protocol's stream cancellation mechanism. Attackers repeatedly open and immediately reset streams within a single connection, bypassing server-side connection limits. This rapid stream cycling consumes server resources disproportionately, leading to denial of service with minimal attacker bandwidth.
Impact and Risks for your Infrastructure
This vulnerability enables highly efficient DDoS attacks, capable of overwhelming HTTP/2 servers with minimal attacker resources. Successful exploitation leads to severe service disruption, infrastructure downtime, and potential data loss due to resource exhaustion across web services.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update all HTTP/2 server implementations to patched versions immediately. For Nginx, upgrade to 1.25.3+ or 1.24.0+. Consult your vendor for specific patches for Apache, Node.js, Go, AWS, and Cloudflare. Verify the fix by ensuring your server software reports the updated version number.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.