{"id":3597,"date":"2023-10-11T09:28:52","date_gmt":"2023-10-11T06:28:52","guid":{"rendered":"https:\/\/www.govcert.bg\/?p=3597"},"modified":"2023-10-12T09:38:59","modified_gmt":"2023-10-12T06:38:59","slug":"%d1%83%d1%8f%d0%b7%d0%b2%d0%b8%d0%bc%d0%be%d1%81%d1%82-cve-2023-44487-http-2-rapid-reset","status":"publish","type":"post","link":"https:\/\/www.govcert.bg\/en\/warnings\/%d1%83%d1%8f%d0%b7%d0%b2%d0%b8%d0%bc%d0%be%d1%81%d1%82-cve-2023-44487-http-2-rapid-reset\/","title":{"rendered":"HTTP\/2 Rapid Reset Vulnerability - CVE-2023-44487"},"content":{"rendered":"<p style=\"text-align: justify;\">Researchers and vendors have disclosed a denial-of-service (DoS) vulnerability in HTTP\/2 protocol. The vulnerability (<a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/10\/10\/http2-rapid-reset-vulnerability-cve-2023-44487\">CVE-2023-44487<\/a>), known as Rapid Reset, has been exploited in the wild in August 2023 through October 2023.<\/p>\n<p style=\"text-align: justify;\">\u0415\u043a\u0441\u043f\u043b\u043e\u0430\u0442\u0430\u0446\u0438\u044f \u0432\u044a\u0440\u0445\u0443 \u0443\u0435\u0431 \u0441\u044a\u0440\u0432\u044a\u0440\u0438 \u0441 HTTP\/2 \u0432\u043e\u0434\u0438 \u0434\u043e Layer 7 DoS &#8211; denial of service (server resource consumption) \u0430\u0442\u0430\u043a\u0430. \u0422\u044f \u0441\u0435 \u0438\u0437\u0440\u0430\u0437\u044f\u0432\u0430 \u0432 \u0441\u043b\u0435\u0434\u043d\u043e\u0442\u043e: \u0413\u0435\u043d\u0435\u0440\u0438\u0440\u0430\u0442 \u0441\u0435 \u0437\u0430\u044f\u0432\u043a\u0438, \u043a\u043e\u0438\u0442\u043e \u0431\u0438\u0432\u0430\u0442 \u0435\u0434\u043d\u043e\u0441\u0442\u0440\u0430\u043d\u043d\u043e \u0441\u043f\u0440\u0435\u043d\u0438 \u043e\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u0434\u043e\u0440\u0438 \u043f\u0440\u0435\u0434\u0438 \u0434\u0430 \u0435 \u043f\u043e\u043b\u0443\u0447\u0435\u043d \u043e\u0442\u0433\u043e\u0432\u043e\u0440 \u043e\u0442 \u0443\u0435\u0431 \u0441\u044a\u0440\u0432\u044a\u0440\u0430, \u0447\u0440\u0435\u0437 \u0438\u0437\u043f\u0440\u0430\u0449\u0430\u043d\u0435 \u043d\u0430 RST_STREAM frame. \u0417\u0430 \u0432\u0441\u044f\u043a\u0430 \u0437\u0430\u044f\u0432\u043a\u0430 \u043c\u043e\u0436\u0435 \u0434\u0430 \u0441\u0435 \u0438\u0437\u043f\u0440\u0430\u0442\u044f\u0442 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d \u0431\u0440\u043e\u0439 \u0437\u0430\u044f\u0432\u043a\u0438 \u0437\u0430 \u043f\u0440\u0435\u043a\u0440\u0430\u0442\u044f\u0432\u0430\u043d\u0435, \u043a\u043e\u0438\u0442\u043e \u0441\u0435\u00a0 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0432\u0430\u0442 \u043e\u0442 \u0443\u0435\u0431 \u0441\u044a\u0440\u0432\u044a\u0440\u0430 \u0438 \u0432\u043e\u0434\u0438 \u0434\u043e \u043f\u0440\u0435\u0442\u043e\u0432\u0430\u0440\u0432\u0430\u043d\u0435 \u0438 \u0438\u0437\u0447\u0435\u0440\u043f\u0432\u0430\u043d\u0435 \u043d\u0430 \u0440\u0435\u0441\u0443\u0440\u0441\u0438\u0442\u0435 \u043c\u0443.<\/p>\n<p style=\"text-align: justify;\"><strong>CERT <\/strong><strong>Bulgaria<\/strong> encourages users and administrators to review the following advisories and apply the necessary updates<\/p>\n<ul>\n<li>Cloudflare: <a href=\"https:\/\/blog.cloudflare.com\/technical-breakdown-http2-rapid-reset-ddos-attack\/\">HTTP\/2 Rapid Reset: deconstructing the record-breaking attack<\/a><\/li>\n<li>Google: <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/how-it-works-the-novel-http2-rapid-reset-ddos-attack\">How it works: The novel HTTP\/2 &#8216;Rapid Reset&#8217; DDoS attack<\/a><\/li>\n<li>AWS: <a href=\"https:\/\/aws.amazon.com\/security\/security-bulletins\/AWS-2023-011\/\">CVE-2023-44487 &#8211; HTTP\/2 Rapid Reset Attack<\/a><\/li>\n<li>NGINX: <a href=\"https:\/\/www.nginx.com\/blog\/http-2-rapid-reset-attack-impacting-f5-nginx-products\/\">HTTP\/2 Rapid Reset Attack Impacting NGINX Products<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>\u0420\u0430\u0437\u043a\u0440\u0438\u0442\u0430 \u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442 \u0432 HTTP\/2 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u043f\u0440\u0438 \u043e\u0442\u043a\u0430\u0437 \u043d\u0430 \u0443\u0441\u043b\u0443\u0433\u0430 (DoS). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0442\u0430 (CVE-2023-44487) \u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430 \u043a\u0430\u0442\u043e Rapid Reset. \u0415\u043a\u0441\u043f\u043b\u043e\u0430\u0442\u0430\u0446\u0438\u044f \u0432\u044a\u0440\u0445\u0443 \u0443\u0435\u0431 \u0441\u044a\u0440\u0432\u044a\u0440\u0438 \u0441 HTTP\/2 \u0432\u043e\u0434\u0438 \u0434\u043e Layer 7 DoS &#8211; denial of service (server resource consumption) \u0430\u0442\u0430\u043a\u0430. \u0422\u044f \u0441\u0435 \u0438\u0437\u0440\u0430\u0437\u044f\u0432\u0430 \u0432 \u0441\u043b\u0435\u0434\u043d\u043e\u0442\u043e: \u0413\u0435\u043d\u0435\u0440\u0438\u0440\u0430\u0442 \u0441\u0435 \u0437\u0430\u044f\u0432\u043a\u0438, \u043a\u043e\u0438\u0442\u043e \u0431\u0438\u0432\u0430\u0442 \u0435\u0434\u043d\u043e\u0441\u0442\u0440\u0430\u043d\u043d\u043e \u0441\u043f\u0440\u0435\u043d\u0438 \u043e\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u0434\u043e\u0440\u0438 \u043f\u0440\u0435\u0434\u0438 \u0434\u0430 \u0435 &#8230; <a title=\"\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442 CVE-2023-44487 &#8211; HTTP\/2 Rapid Reset\" class=\"read-more\" href=\"https:\/\/www.govcert.bg\/en\/warnings\/%d1%83%d1%8f%d0%b7%d0%b2%d0%b8%d0%bc%d0%be%d1%81%d1%82-cve-2023-44487-http-2-rapid-reset\/\" aria-label=\"More on \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442 CVE-2023-44487 &#8211; HTTP\/2 Rapid Reset\">Read more<\/a><\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-3597","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=3597"}],"version-history":[{"count":8,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3597\/revisions"}],"predecessor-version":[{"id":3612,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3597\/revisions\/3612"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=3597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/categories?post=3597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/tags?post=3597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}