Skip to main content

CVE-2023-44487: n/a in n/a

High
VulnerabilityCVE-2023-44487cvecve-2023-44487
Published: Tue Oct 10 2023 (10/10/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

AI-Powered Analysis

AILast updated: 07/09/2025, 00:25:48 UTC

Technical Analysis

CVE-2023-44487 is a high-severity vulnerability affecting the HTTP/2 protocol, specifically related to how request cancellations are handled. HTTP/2 allows clients to cancel requests, which results in resetting streams on the server side. This vulnerability arises because an attacker can rapidly send many request cancellations, causing the server to reset numerous streams in quick succession. This behavior leads to excessive consumption of server resources, effectively resulting in a denial of service (DoS) condition. The vulnerability is categorized under CWE-400, which pertains to uncontrolled resource consumption. Although the exact affected products or versions are not specified, the issue lies within the HTTP/2 protocol implementation itself, which is widely used in modern web servers and applications. The CVSS v3.1 score is 7.5, indicating a high severity with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). The vulnerability was actively exploited in the wild between August and October 2023, demonstrating its practical risk. No patches or vendor-specific mitigations are currently listed, which suggests that affected organizations need to rely on configuration changes or network-level protections until official fixes are available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of web services that rely on HTTP/2. Given the widespread adoption of HTTP/2 in European enterprises, government agencies, and critical infrastructure providers, exploitation could lead to service outages, degraded performance, and potential disruption of business operations. Sectors such as finance, healthcare, telecommunications, and public administration are particularly vulnerable due to their reliance on high-availability web services. The denial of service could also be leveraged as part of a larger attack campaign to distract or disable defenses while other attacks are conducted. Additionally, the lack of required authentication or user interaction means that attackers can exploit this vulnerability remotely and anonymously, increasing the threat surface. The impact is primarily on availability, but prolonged outages could indirectly affect confidentiality and integrity by forcing fallback to less secure systems or emergency procedures.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement specific mitigations to reduce the risk of exploitation. These include: 1) Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) capable of detecting and throttling abnormal HTTP/2 stream reset patterns to block or rate-limit suspicious traffic. 2) Configuring HTTP/2 server implementations to limit the number of concurrent streams and the rate of stream resets per client IP to prevent resource exhaustion. 3) Employing network-level rate limiting and anomaly detection to identify and mitigate rapid cancellation attacks. 4) Monitoring server logs and network traffic for unusual spikes in HTTP/2 stream resets or cancellations. 5) Considering temporary disabling or downgrading to HTTP/1.1 on critical systems if mitigation controls are insufficient and the risk is high. 6) Keeping abreast of vendor advisories for patches or updates addressing this vulnerability and applying them promptly once available. 7) Conducting regular resilience testing and incident response drills to prepare for potential DoS scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-09-29T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68449e1071f4d251b5219735

Added to database: 6/7/2025, 8:16:16 PM

Last enriched: 7/9/2025, 12:25:48 AM

Last updated: 7/13/2025, 3:24:35 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

NVD DatabaseMITRE CVEReference 1Reference 2Reference 3Reference 4Reference 5Reference 6Reference 7Reference 8Reference 9Reference 10Reference 11Reference 12Reference 13Reference 14Reference 15Reference 16Reference 17Reference 18Reference 19Reference 20Reference 21Reference 22Reference 23Reference 24Reference 25Reference 26Reference 27Reference 28Reference 29Reference 30Reference 31Reference 32Reference 33Reference 34Reference 35Reference 36Reference 37Reference 38Reference 39Reference 40Reference 41Reference 42Reference 43Reference 44Reference 45Reference 46Reference 47Reference 48Reference 49Reference 50Reference 51Reference 52Reference 53Reference 54Reference 55Reference 56Reference 57Reference 58Reference 59Reference 60Reference 61Reference 62Reference 63Reference 64Reference 65Reference 66Reference 67Reference 68Reference 69Reference 70Reference 71Reference 72Reference 73Reference 74Reference 75Reference 76Reference 77Reference 78Reference 79Reference 80Reference 81Reference 82Reference 83Reference 84Reference 85Reference 86Reference 87Reference 88Reference 89Reference 90Reference 91Reference 92Reference 93Reference 94Reference 95Reference 96Reference 97Reference 98Reference 99Reference 100Reference 101Reference 102Reference 103Reference 104Reference 105Reference 106Reference 107Reference 108Reference 109Reference 110Reference 111Reference 112Reference 113Reference 114Reference 115Reference 116Reference 117Reference 118Reference 119Reference 120Reference 121Reference 122Reference 123Reference 124Reference 125Reference 126Reference 127Reference 128Reference 129Reference 130Reference 131Reference 132Reference 133Reference 134Reference 135Reference 136Reference 137Reference 138Reference 139Reference 140Reference 141Reference 142Reference 143Reference 144Reference 145Reference 146Reference 147Reference 148Reference 149Reference 150Reference 151Reference 152Reference 153Reference 154Reference 155Reference 156Reference 157Reference 158Reference 159Reference 160Reference 161Reference 162Reference 163Reference 164Reference 165Reference 166Search on Google

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats