HTTP/2 Protocol Vulnerability Allows for Rapid Stream Cancellation and Denial of Service Attacks
CVE-2023-44487
Key Information:
- Vendor
- Ietf
- Status
- Http
- Vendor
- CVE Published:
- 10 October 2023
Badges
Summary
The HTTP/2 protocol is susceptible to a denial of service vulnerability that can be exploited via rapid stream resets. This allows attackers to overwhelm servers by rapidly canceling requests, leading to significant resource consumption and potential service disruption. Exploitation of this vulnerability has been observed in real-world scenarios between August and October 2023, prompting urgent response measures across multiple platforms and server technologies. Organizations utilizing affected products must evaluate their configurations to implement mitigations and safeguard against potential attacks.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487) - Help Net Security
HTTP/2 Rapid Reset (CVE-2023-44487), a zero-day vulnerability has been used to mount massive, high-volume DDoS attacks.
References
EPSS Score
80% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- π°
Used in Ransomware
- πΎ
Exploit known to exist
- π¦
CISA Reported
- π°
First article discovered by Help Net Security
Vulnerability published
Vulnerability Reserved