How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability published on October 10, 2023. This critical flaw affects virtually all HTTP/2 server implementations, enabling highly efficient denial-of-service attacks.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the protocol's stream cancellation. Attackers send requests and immediately cancel them, overwhelming server resources without full connections. This rapid creation and reset cycle exhausts server capacity, leading to a denial of service.
Impact and Risks for your Infrastructure
This vulnerability allows attackers to launch massive DDoS attacks with minimal resources, severely impacting service availability. Businesses face significant downtime, reputational damage, and potential revenue loss due to server overload and service disruption.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server to the latest patched version. For Nginx, upgrade to 1.25.3+; for nghttp2, use 1.57.0+. Verify the fix by checking your server's version and monitoring for unusual traffic or resource spikes. Consult vendor-specific advisories.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.