How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) published on October 10, 2023. This critical flaw affects virtually all HTTP/2 server implementations, enabling highly efficient denial-of-service attacks.
What is HTTP/2 Rapid Reset DDoS Attack?
This attack exploits the HTTP/2 protocol's stream cancellation feature. Attackers send numerous requests, immediately canceling them before full server processing. This rapid request-reset cycle exhausts server resources, causing a denial of service.
Impact and Risks for your Infrastructure
This vulnerability enables extremely efficient HTTP/2 DDoS attacks with minimal attacker resources. It can overwhelm critical services, causing significant operational disruption, revenue loss, and reputational damage for businesses. Infrastructure can face costly outages.
Step-by-Step Mitigation Guide
Mitigate CVE-2023-44487 by updating HTTP/2 server implementations to patched versions. For Nginx, upgrade to 1.25.3+ or 1.24.0+. For nghttp2, update to 1.57.0+. Consult vendor advisories for specific patches and verify successful application by checking version numbers and monitoring server performance.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.