[CDP-development] TLP:GREEN UPDATED (DoS Vulnerability Alert Notification) CVE-2023-44487 - HTTP/2 Rapid Reset Vulnerability
CSS Security Operations Services * DAS
css-soc-services at das.oregon.gov
Thu Oct 26 10:30:44 PDT 2023
Good morning,
The previous alert has been updated. Updated information has been added in red
The SOC Services team is reporting on the vulnerability: CVE-2023-44487 HTTP/2 Rapid Reset Vulnerability. Due to its high visibility and knowledge of the software installed in the state environment, we are providing this in-depth information:
History: On October 10, 2023, CISA added CVE-2023-44487 to the known exploited vulnerabilities catalog. CVE-2023-44487 is a denial-of-service (DoS) known as Rapid Reset that impacts the HTTP/2 protocol, which was exploited in the largest mitigated DDOS attacks.
Stats from mitigated attacks:
* Google Cloud: above 398 million rps
* Cloudflare: 201 million rps
* Amazon: 155 million rps
CISA recommends organizations that provide HTTP/2 services apply patches when available and consider configuration changes and other mitigations discussed in the references below. For more information on Rapid Reset, see:
* Cloudflare: HTTP/2 Rapid Reset: deconstructing the record-breaking attack<https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/>
* Google: How it works: The novel HTTP/2 'Rapid Reset' DDoS attack<https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack>
* AWS: CVE-2023-44487 - HTTP/2 Rapid Reset Attack<https://aws.amazon.com/security/security-bulletins/AWS-2023-011/>
* NGINX: HTTP/2 Rapid Reset Attack Impacting NGINX Products<https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/>
Organizations can take proactive steps to reduce the effects of DoS attacks. See the following guidance for more information:
* CISA: Understanding and Responding to Distributed Denial-of-Service Attacks<https://www.cisa.gov/sites/default/files/publications/understanding-and-responding-to-ddos-attacks_508c.pdf>
* CISA: Additional DDoS Guidance for Federal Agencies<https://www.cisa.gov/sites/default/files/publications/ceg-additional-ddos-guidance-for-federal-agencies_508c.pdf>
Intelligence: CVE-2023-44487 has been confirmed as being exploited in the wild between August 2023 to October 2023. As of October 26, 2023 Cloudflare is seeing a surge of Rapid Reset DDOS attacks.
Cloudflare has provided detailed information regarding the HTTP/2 Rapid Reset attacks which can be found here: https://blog.cloudflare.com/ddos-threat-report-2023-q3/
Workarounds: Workarounds are vendor specific.
How it works: The CVE-2023-44487 HTTP/2 vulnerability allows malicious actors to launch a DDoS attack targeting HTTP/2 servers. The attack sends a set number of HTTP requests using HEADERS followed by RST_STREAM and repeating this pattern to generate a high volume of traffic on the targeted HTTP/2 servers. By packing multiple HEADERS and RST_STREAM frames in a single connection, attackers can cause a significant increase in the request per second and high CPU utilization on the servers that eventually can cause resource exhaustion.
Post-Exploit: Upon successful exploitation of the vulnerability, a threat actor could execute denial-of-service attacks.
As of October 26, 2023, there are a total of 172 plugins for Rapid Reset that have been provided by Tenable. Three of the plugins are for Tenable WAS and the rest for Nessus Security Center.
A link to all available plugins can be found here: https://www.tenable.com/plugins/search?q=%22cve-2023-44487%22%20AND%20cves%3A(%22CVE-2023-44487%22)&sort=&page=1
The updated plugins scan for the following systems. Please note that other services also have plugins.
* Red Hat
* Amazon
* Alma Linux
* F5 Networks
* Rocky Linux
* Oracle Linux
* Ubuntu Linux
* Windows
* Fedora Linux
* SuSE Linux
* CentOS Linux
* Debian Linux
* Apache Tomcat
As an alternative to using plugins for the search as there is a very large amount of available plugins, Nessus Security Center has the ability to search by CVE. To do this follow the instructions below:
* Click Analysis
* Select Vulnerabilities
* On the left hand side of the screen click the filter icon which looks like ">".
* Click + Customize
* Scroll down and select CVE ID
* Click CVE ID to expand
* Search for CVE-2023-44487
* Click apply and your search results will appear
Recommended Actions:
* Verify host has not been compromised before applying patches.
* Apply appropriate updates provided by vendor to vulnerable systems immediately after appropriate testing.
* Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
* Apply the Principle of Least Privilege to all systems and services.
[cid:image001.png at 01DA07EA.88CC8F20]
Cyber Security Services
State of Oregon Cyber Security Services
Enterprise Information Services | SOC
Cyber Security Services (CSS)
SOC Hotline: (503) 378-5930 | SOC Services (503) 373-0378
"Ensuring user-friendly, reliable and secure state technology systems that serve Oregonians."
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20231026/f68d2411/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 21907 bytes
Desc: image001.png
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20231026/f68d2411/attachment-0001.png>
More information about the CDP-development
mailing list