How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability (CVSS 7.5) published on October 10, 2023. This critical flaw affects virtually all HTTP/2 server implementations, enabling highly efficient denial-of-service attacks. Immediate action is required to protect your infrastructure.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the protocol's stream cancellation mechanism. Attackers repeatedly open and immediately reset numerous HTTP/2 streams within a single connection. This rapid cycle overwhelms server resources, consuming CPU and memory without completing requests, leading to a denial of service.
Impact and Risks for your Infrastructure
This vulnerability enables extremely efficient DDoS attacks, allowing attackers to overwhelm servers with minimal resources. Businesses face severe service disruptions, reputational damage, and potential financial losses due to unavailability. Infrastructure can experience significant performance degradation and complete outages.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update all affected HTTP/2 server implementations to their patched versions immediately. For Nginx, upgrade to 1.25.3+ or 1.24.0+. Verify the fix by confirming your server software versions meet or exceed the vendor-recommended patched releases.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.