HTTP2.RST_STREAM.Rapid.Reset.CVE-2023-44487.DoS
Description
This indicates an attack attempt to exploit a Denial of Service Vulnerability in HTTP/2 protocol.
The vulnerability is due to HTTP/2 request cancellation can reset many streams quickly. A remote, unauthenticated attacker can exploit this vulnerability by initiating a large number of request and reset to a vulnerable server. Successful exploitation results in the consumption of excessive amounts of memory, eventually leading to denial of service conditions.
This signature is rate based, tracking source IP. It detects 1000 reset requests within 2 seconds. Customers should adjust the rate to suit their needs.
Outbreak Alert
A newly identified Distributed Denial-of-Service (DDoS) attack technique is used in the wild. This DDoS attack, known as ‘HTTP/2 Rapid Reset’, leverages a flaw in the implementation of protocol HTTP/2.
Affected Products
Web servers that support HTTP/2 protocol
Impact
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |