How to fix CVE-2023-44487 – Step-by-Step Guide
CVE-2023-44487, known as the HTTP/2 Rapid Reset DDoS Attack, is a high-severity vulnerability published on October 10, 2023. This critical flaw affects virtually all HTTP/2 server implementations. It enables attackers to launch highly efficient denial-of-service attacks.
What is HTTP/2 Rapid Reset DDoS Attack?
The HTTP/2 Rapid Reset Attack exploits a flaw in the protocol's stream cancellation mechanism. Attackers send a request, immediately cancel it, and repeat this thousands of times per connection. This rapid stream creation and reset exhausts server resources, leading to a denial of service.
Impact and Risks for your Infrastructure
This vulnerability allows attackers to launch devastating DDoS attacks with minimal resources, potentially taking down critical services. Businesses face significant operational disruption, revenue loss, and reputational damage due to service unavailability. Infrastructure can be overwhelmed, leading to costly recovery efforts.
Step-by-Step Mitigation Guide
To mitigate CVE-2023-44487, update your HTTP/2 server implementations to the latest patched versions immediately. For Nginx, upgrade to 1.25.3+ or 1.24.0+. Consult vendor advisories for Apache, Node.js, and others. Verify the fix by confirming your server's HTTP/2 library version is patched.
- 1Update nginx to 1.25.3+, Apache to 2.4.58+, and apply all vendor patches.
- 2Enable Cloudflare or CDN-level DDoS protection.
- 3Set http2_max_concurrent_streams to a low value (e.g., 128) in nginx.
- 4Implement rate limiting on HTTP/2 connections at the edge.
- 5Monitor for traffic spikes and RESET_STREAM frames.
- 6Consider disabling HTTP/2 on exposed endpoints if not required.