CVE-2023-44487 - Rapid Reset HTTP/2 vulnerability
Summary
The Fortinet Product Security team has evaluated the impact of the vulnerablity HTTP/2 Rapid Reset Attack, listed below:
CVE-2023-44487:
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly.
https://nvd.nist.gov/vuln/detail/CVE-2023-44487
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.4 | 7.4.0 through 7.4.1 | Upgrade to 7.4.2 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.7 | Upgrade to 7.2.8 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.13 | Upgrade to 7.0.14 or above |
| FortiOS 6.4 | Not affected | Not Applicable |
| FortiProxy 7.4 | 7.4.0 through 7.4.1 | Upgrade to 7.4.2 or above |
| FortiProxy 7.2 | 7.2.0 through 7.2.7 | Upgrade to 7.2.8 or above |
| FortiProxy 7.0 | 7.0 all versions | Migrate to a fixed release |
| FortiProxy 2.0 | Not affected | Not Applicable |
| FortiProxy 1.2 | Not affected | Not Applicable |
FortiSASE: Issue remediated Q3/23
Workaround:
HTTP/2 support with proxy mode with SSL inspection can be removed with the following configuration:
config firewall ssl-ssh-profile
edit
set supported-alpn http1-1
next
end
For VIP:
In FortiOS 7.2.4 - 7.2.6, and 7.4.0:
config firewall vip
edit
set http-supported-max-version http1
next
end
In FortiOS 7.4.1 and later:
config firewall vip
edit
set h2-support disable
next
end
Virtual Patch named "HTTP2.RST_STREAM.Rapid.Reset.DoS." is available in FMWP db update 24.014.
Timeline
2024-02-08: Initial publication2024-06-19: Adjusted fixed version for FortiOS 7.2
2025-01-15: Added IPS package info