HTTP2.RST_STREAM.Rapid.Reset.CVE-2023-44487.DoS

description-logoDescription

This indicates an attack attempt to exploit a Denial of Service Vulnerability in HTTP/2 protocol.
The vulnerability is due to HTTP/2 request cancellation can reset many streams quickly. A remote, unauthenticated attacker can exploit this vulnerability by initiating a large number of request and reset to a vulnerable server. Successful exploitation results in the consumption of excessive amounts of memory, eventually leading to denial of service conditions.
This signature is rate based, tracking source IP. It detects 1000 reset requests within 2 seconds. Customers should adjust the rate to suit their needs.

description-logoOutbreak Alert

A newly identified Distributed Denial-of-Service (DDoS) attack technique is used in the wild. This DDoS attack, known as ‘HTTP/2 Rapid Reset’, leverages a flaw in the implementation of protocol HTTP/2.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Web servers that support HTTP/2 protocol

Impact logoImpact

Denial of Service: Remote attackers can crash vulnerable systems.

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2025-05-13 32.006
Modified
Sig Added
2023-11-22 26.682
Modified
Default_action:pass:drop
2023-10-25 25.665
New