Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-44487: n/a

0
High
VulnerabilityCVE-2023-44487cvecve-2023-44487
Published: Tue Oct 10 2023 (10/10/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:37:43 UTC

Technical Analysis

CVE-2023-44487 is a vulnerability rooted in the HTTP/2 protocol's handling of request cancellations. HTTP/2 allows clients to cancel requests, which leads to resetting streams on the server side. This vulnerability arises because an attacker can rapidly send many request cancellations, causing the server to reset a large number of streams in quick succession. This behavior leads to excessive consumption of server resources such as CPU and memory, resulting in a denial of service (DoS) condition. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption). The CVSS v3.1 score is 7.5 (high), reflecting that the attack can be performed remotely (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. No specific vendor or product versions are listed, indicating that this is a protocol-level issue potentially affecting multiple HTTP/2 implementations. The vulnerability was exploited in the wild between August and October 2023, demonstrating active threat actors leveraging this flaw. No patches are currently linked, suggesting that mitigation may rely on configuration changes or vendor updates in progress. The vulnerability's exploitation does not require authentication, making it accessible to any remote attacker capable of sending HTTP/2 traffic to the target server.

Potential Impact

For European organizations, the primary impact is service disruption due to denial of service attacks targeting HTTP/2-enabled web servers or proxies. This can lead to downtime of critical web applications, loss of availability for customers and internal users, and potential reputational damage. Organizations providing online services, e-commerce platforms, financial institutions, and public sector entities are particularly vulnerable as they often rely heavily on HTTP/2 for performance improvements. The attack can degrade server performance, increase operational costs due to resource exhaustion, and potentially cascade into broader network disruptions if mitigation is not promptly applied. Given the remote and unauthenticated nature of the exploit, attackers can launch large-scale attacks with minimal effort, increasing the risk of widespread outages. The lack of specific vendor patches at the time of reporting means organizations must proactively implement mitigations to reduce exposure. The impact is amplified in countries with dense internet infrastructure and high volumes of HTTP/2 traffic, where attackers may seek to disrupt critical digital services.

Mitigation Recommendations

1. Implement rate limiting on HTTP/2 stream resets and cancellations to prevent rapid, repeated resets from overwhelming server resources. 2. Configure web servers and proxies to detect and block suspicious patterns of request cancellations indicative of attack behavior. 3. Monitor HTTP/2 traffic for abnormal spikes in stream resets and cancellations to enable early detection of exploitation attempts. 4. Apply any vendor patches or updates as soon as they become available, prioritizing HTTP/2 stack components in web servers, load balancers, and proxies. 5. Consider temporarily disabling HTTP/2 support on critical servers if mitigation options are limited and the risk of attack is high. 6. Harden server resource allocation and implement connection throttling to reduce the impact of resource exhaustion attacks. 7. Employ Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics targeting this specific attack pattern. 8. Conduct regular security assessments and stress testing to evaluate server resilience against HTTP/2-based DoS attacks. These steps go beyond generic advice by focusing on HTTP/2-specific behaviors and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-09-29T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68449e1071f4d251b5219735

Added to database: 6/7/2025, 8:16:16 PM

Last enriched: 11/4/2025, 9:37:43 PM

Last updated: 12/3/2025, 1:49:26 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

NVD DatabaseMITRE CVEReference 1Reference 2Reference 3Reference 4Reference 5Reference 6Reference 7Reference 8Reference 9Reference 10Reference 11Reference 12Reference 13Reference 14Reference 15Reference 16Reference 17Reference 18Reference 19Reference 20Reference 21Reference 22Reference 23Reference 24Reference 25Reference 26Reference 27Reference 28Reference 29Reference 30Reference 31Reference 32Reference 33Reference 34Reference 35Reference 36Reference 37Reference 38Reference 39Reference 40Reference 41Reference 42Reference 43Reference 44Reference 45Reference 46Reference 47Reference 48Reference 49Reference 50Reference 51Reference 52Reference 53Reference 54Reference 55Reference 56Reference 57Reference 58Reference 59Reference 60Reference 61Reference 62Reference 63Reference 64Reference 65Reference 66Reference 67Reference 68Reference 69Reference 70Reference 71Reference 72Reference 73Reference 74Reference 75Reference 76Reference 77Reference 78Reference 79Reference 80Reference 81Reference 82Reference 83Reference 84Reference 85Reference 86Reference 87Reference 88Reference 89Reference 90Reference 91Reference 92Reference 93Reference 94Reference 95Reference 96Reference 97Reference 98Reference 99Reference 100Reference 101Reference 102Reference 103Reference 104Reference 105Reference 106Reference 107Reference 108Reference 109Reference 110Reference 111Reference 112Reference 113Reference 114Reference 115Reference 116Reference 117Reference 118Reference 119Reference 120Reference 121Reference 122Reference 123Reference 124Reference 125Reference 126Reference 127Reference 128Reference 129Reference 130Reference 131Reference 132Reference 133Reference 134Reference 135Reference 136Reference 137Reference 138Reference 139Reference 140Reference 141Reference 142Reference 143Reference 144Reference 145Reference 146Reference 147Reference 148Reference 149Reference 150Reference 151Reference 152Reference 153Reference 154Reference 155Reference 156Reference 157Reference 158Reference 159Reference 160Reference 161Reference 162Reference 163Reference 164Reference 165Reference 166Reference 167Reference 168Search on Google

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats