Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-122
Version:
2.0
Affected software:
HTTP/2
Type:
Denial of Service
CVE/CVSS:
https://nvd.nist.gov/vuln/detail/CVE-2023-44487
Risk: A new DDoS technique named 'HTTP/2 Rapid Reset' has been actively exploited as a zero-day vulnerability since August, breaking all previous DDoS records. It exploits a zero-day vulnerability tracked as CVE-2023-44487, abusing a weakness in the HTTP/2 protocol.
Threat Actors: Threat actors, including those with relatively small botnets, have already abused this technique. As more expansive botnets adopt this method, it is expected to continue breaking records.
Historical Events: Since late August, Cloudflare, Google and Amazon Web Services have detected and mitigated thousands of 'HTTP/2 Rapid Reset' DDoS attacks, several of which breaking previous DDoS records.
Technology Targeted: This vulnerability targets the HTTP/2 protocol, commonly used in web servers and browsers.
Interest to Actors: Threat actors can overwhelm target servers/applications, imposing a Denial of Service (DoS) state, making it appealing for those with malicious intent.
Impact on CIA Triad: There is a high impact on availability.
A new DDoS technique called 'HTTP/2 Rapid Reset' is currently being exploited as a zero-day vulnerability. This method abuses a zero-day vulnerability, CVE-2023-44487, which targets a weakness in the HTTP/2 protocol. In simple terms, it overwhelms target servers or applications by exploiting HTTP/2's stream cancellation feature. This feature, can be abused by malicious actors to send a barrage of HTTP/2 requests and resets, causing rapid resets and overwhelming the server's capacity to respond to new incoming requests.
Several major tech companies, including Amazon Web Services, Cloudflare, and Google, have reported mitigating record-breaking DDoS attacks using this technique.
The Centre for Cyber Security Belgium strongly recommends to take the following actions:
Possible workaround
Vendor advisories and statements