CVE-2023-44487Exploit Available

HTTP/2 Rapid Reset DDoS Attack (CVSS 7.5)

🏭 IETF (Protocol-Level)CWE-400#DDoS#HTTP/2#Protocol#Infrastructure
7.5High
010.0

Vulnerability Description

A zero-day vulnerability in the HTTP/2 protocol allows attackers to launch massive record-breaking DDoS attacks by weaponizing the RST_STREAM/HEADERS frame cancellation mechanism to overwhelm servers without resource consumption on the attacker side.

Recommended Mitigation

Apply vendor-specific patches for your HTTP/2 server. Limit maximum concurrent streams per connection. Enable HTTP/2 flood protection on WAF/CDN.

Affected Products

NGINX
Apache httpd
Envoy
Go net/http
Node.js
gRPC

Version constraint: All HTTP/2 server implementations before vendor-specific patches

Quick Facts

Published
2023-10-10
Last Modified
2023-10-16
Vendor
IETF (Protocol-Level)
CWE
CWE-400
Exploit
⚠️ Public Exploit Exists

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H