Vulnerability DatabaseGHSA-9wmc-rg4h-28wv

GHSA-9wmc-rg4h-28wv
vulnerability analysis and mitigation

Overview

The HTTP/2 'Rapid Reset' vulnerability (CVE-2023-44487) is a critical security flaw discovered in the HTTP/2 protocol implementation that allows attackers to perform denial-of-service attacks. The vulnerability was disclosed in October 2023 and affects multiple HTTP/2 implementations. The attack peaked in August 2023, with the largest attack surpassing 398 million requests per second (Google Cloud Blog).

Technical details

The vulnerability exploits HTTP/2's stream multiplexing feature where clients can create and immediately cancel streams using RST_STREAM frames. In a typical HTTP/2 server implementation, the server must perform significant work for canceled requests, such as allocating stream data structures, parsing queries, and header decompression, while the client pays minimal costs. The attack creates an exploitable cost asymmetry between the server and client. The compression allows a high number of HEADERS frames to be sent in a few kilobytes of wire data, causing servers to process them simultaneously (Envoy Advisory).

Impact

The attack can cause denial of service through CPU exhaustion, preventing legitimate requests from making progress and resulting in either elevated latency or request timeouts. The vulnerability enables attackers to bypass server concurrent stream limits and create an indefinite number of in-flight requests, limited only by available network bandwidth rather than round-trip time (Google Cloud Blog).

Mitigation and workarounds

Mitigations include implementing connection and stream timeouts, setting HTTP/2 maximum concurrent streams limit to 100, limiting HTTP/2 initial stream window size to 64 KiB, and initial connection window size to 1 MiB. For some systems, disabling HTTP/2 protocol for downstream connections can serve as a temporary workaround. Organizations should apply available patches and updates immediately. Additional protections include implementing rate limiting on RST_STREAM frames and closing connections when abuse is detected (Envoy Advisory, NGINX Blog).

Community reactions

The vulnerability prompted a coordinated industry response, with major technology companies including Google, Cloudflare, Amazon, and NGINX collaborating on identification and mitigation strategies. Google helped lead a coordinated vulnerability disclosure process, focusing on notifying large-scale implementers of HTTP/2 including infrastructure companies and server software providers (Google Cloud Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management