n
ISC2 CISO Jon France, CISSP, ChCSP, explains more about this vulnerability, the implications for cybersecurity professionals and affected organizations, along with advice on steps to mitigate it.
nn
ISC2 CISO Jon France, CISSP, ChCSP, explains more about this vulnerability, the implications for cybersecurity professionals and affected organizations, along with advice on steps to mitigate it.
nnA resource consumption attack vector related to sites that use thenHTTP/2 protocol. The impact of leveraging the vulnerability is a denial of service (DoS) resulting from the consumptionnof system resources when dealing with a large volume of HTTP/2 resetnmessages.
nThe vulnerability is widespread as the core method (Reset) is a part of thenHTTP/2 protocol and many systems implement the handling of resetnrequests in a way that may be vulnerable to triggering consuming servernresources faster than they can be released when dealing with a massnof requests. Ultimately, exploiting the vulnerability results in the failure/off-lining ofnthe server.
nAt the core of the issue is that HTTP/2 allows multiplexing of multiple requests fromna single client (an endpoint). An attacker establishes a HTTP/2 connectionnand immediately issues a ‘Reset’ message to clear the connection. While this costs the client very little in terms of effort and resource, typically on the server side this will consume resources whilst thenconnection is ‘tidied up’ and released.
nIf a large number of these ‘connection then Reset’ requests are received the net affect on the server side is one of creating a backlog of clearing processes that consume resources, causing resource depletion and a probable DoS-like failure of the service.
nn
nThe effect of this will manifest in the following ways:
nn
nn
nnProfile where you may be vulnerable:
nHarden where possible:
nMonitor:
nFinally, regularly check with vendors and monitor their advice and available software updates.
nn
nn
nnThe CVE and related information can be found at https://www.cve.org/CVERecord?id=CVE-2023-44487.
nFor additional training and professional development support in dealing with DoS and vulnerability exploits, take a look at our Skill Builder courses for Network Security and Security Operations: https://www.isc2.org/professional-development/skill-builders.
n