Exploited
7.5
CWE
400
Advisory Published
CVE Published
Advisory Published
Advisory Published
Advisory Published
Updated

CVE-2023-44487: - Rapid Reset HTTP/2 vulnerability

First published: Mon Oct 09 2023(Updated: )

## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to the server that a previous stream should be canceled by sending a RST_STREAM frame. The protocol does not require the client and server to coordinate the cancellation in any way, the client may do it unilaterally. The client may also assume that the cancellation will take effect immediately when the server receives the RST_STREAM frame, before any other data from that TCP connection is processed. Abuse of this feature is called a Rapid Reset attack because it relies on the ability for an endpoint to send a RST_STREAM frame immediately after sending a request frame, which makes the other endpoint start working and then rapidly resets the request. The request is canceled, but leaves the HTTP/2 connection open. The HTTP/2 Rapid Reset attack built on this capability is simple: The client opens a large number of streams at once as in the standard HTTP/2 attack, but rather than waiting for a response to each request stream from the server or proxy, the client cancels each request immediately. The ability to reset streams immediately allows each connection to have an indefinite number of requests in flight. By explicitly canceling the requests, the attacker never exceeds the limit on the number of concurrent open streams. The number of in-flight requests is no longer dependent on the round-trip time (RTT), but only on the available network bandwidth. In a typical HTTP/2 server implementation, the server will still have to do significant amounts of work for canceled requests, such as allocating new stream data structures, parsing the query and doing header decompression, and mapping the URL to a resource. For reverse proxy implementations, the request may be proxied to the backend server before the RST_STREAM frame is processed. The client on the other hand paid almost no costs for sending the requests. This creates an exploitable cost asymmetry between the server and the client. Multiple software artifacts implementing HTTP/2 are affected. This advisory was originally ingested from the `swift-nio-http2` repo advisory and their original conent follows. ## swift-nio-http2 specific advisory swift-nio-http2 is vulnerable to a denial-of-service vulnerability in which a malicious client can create and then reset a large number of HTTP/2 streams in a short period of time. This causes swift-nio-http2 to commit to a large amount of expensive work which it then throws away, including creating entirely new `Channel`s to serve the traffic. This can easily overwhelm an `EventLoop` and prevent it from making forward progress. swift-nio-http2 1.28 contains a remediation for this issue that applies reset counter using a sliding window. This constrains the number of stream resets that may occur in a given window of time. Clients violating this limit will have their connections torn down. This allows clients to continue to cancel streams for legitimate reasons, while constraining malicious actors.

Credit: cve@mitre.org cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Microsoft Windows 11=21H2
Microsoft Windows 11=21H2
Microsoft Windows Server 2022
Microsoft Windows Server 2022
Microsoft Windows 11=22H2
Microsoft Windows 11=22H2
Microsoft Windows Server 2019
Microsoft Windows Server 2019
Microsoft Windows 10=21H2
Microsoft Windows 10=21H2
Microsoft Windows 10=21H2
Microsoft Windows 10=22H2
Microsoft Windows 10=1809
Microsoft Windows 10=1607
Microsoft Windows 10=1607
Microsoft Windows 10=1809
Microsoft Windows 10=22H2
Microsoft Windows 10=22H2
Microsoft Windows 10=1809
debian/netty<=1:4.1.48-7<=1:4.1.48-4
1:4.1.48-8
1:4.1.48-4+deb11u2
1:4.1.48-7+deb12u1
Microsoft ASP.NET Core=7.0
Microsoft ASP.NET Core=6.0
Microsoft Windows Server 2016
Microsoft Windows Server 2016
Microsoft .NET 6.0
Microsoft .NET 7.0
maven/org.apache.tomcat:tomcat-coyote>=8.5.0<8.5.94
8.5.94
maven/org.apache.tomcat:tomcat-coyote>=9.0.0<9.0.81
9.0.81
maven/org.apache.tomcat:tomcat-coyote>=10.0.0<10.1.14
10.1.14
maven/org.apache.tomcat:tomcat-coyote>=11.0.0-M1<11.0.0-M12
11.0.0-M12
maven/com.typesafe.akka:akka-http-core_2.11<=10.1.15
maven/com.typesafe.akka:akka-http-core_2.12<10.5.3
10.5.3
maven/com.typesafe.akka:akka-http-core_2.13<10.5.3
10.5.3
maven/com.typesafe.akka:akka-http-core<10.5.3
10.5.3
maven/org.eclipse.jetty.http2:jetty-http2-server>=12.0.0<12.0.2
12.0.2
maven/org.eclipse.jetty.http2:jetty-http2-common>=12.0.0<12.0.2
12.0.2
maven/org.eclipse.jetty.http2:http2-server>=11.0.0<11.0.17
11.0.17
maven/org.eclipse.jetty.http2:http2-server>=10.0.0<10.0.17
10.0.17
maven/org.eclipse.jetty.http2:http2-server>=9.3.0<9.4.53
9.4.53
maven/org.eclipse.jetty.http2:http2-common>=11.0.0<11.0.17
11.0.17
maven/org.eclipse.jetty.http2:http2-common>=10.0.0<10.0.17
10.0.17
maven/org.eclipse.jetty.http2:http2-common>=9.3.0<9.4.53
9.4.53
swift/github.com/apple/swift-nio-http2<1.28.0
1.28.0
maven/org.apache.tomcat.embed:tomcat-embed-core>=8.5.0<8.5.94
8.5.94
maven/org.apache.tomcat.embed:tomcat-embed-core>=9.0.0<9.0.81
9.0.81
maven/org.apache.tomcat.embed:tomcat-embed-core>=10.0.0<10.1.14
10.1.14
maven/org.apache.tomcat.embed:tomcat-embed-core>=11.0.0-M1<11.0.0-M12
11.0.0-M12
go/google.golang.org/grpc<1.56.3
1.56.3
go/google.golang.org/grpc>=1.57.0<1.57.1
1.57.1
go/google.golang.org/grpc>=1.58.0<1.58.3
1.58.3
go/golang.org/x/net<0.17.0
0.17.0
IETF HTTP
IETF HTTP=2.0
libnghttp2-14<1.57.0
Netty Netty<4.1.100
Envoy Proxy=1.24.10
Envoy Proxy=1.25.9
Envoy Proxy=1.26.4
Envoy Proxy=1.27.0
Eclipse Jetty<9.4.53
Eclipse Jetty>=10.0.0<10.0.17
Eclipse Jetty>=11.0.0<11.0.17
Eclipse Jetty>=12.0.0<12.0.2
Caddy<2.7.5
Ruby<1.20.10
Ruby>=1.21.0<1.21.3
golang http2 Go<0.17.0
golang networking go<0.17.0
F5 BIG-IP Access Policy Manager>=13.1.0<=13.1.5
F5 BIG-IP Access Policy Manager>=14.1.0<=14.1.5
F5 BIG-IP Access Policy Manager>=15.1.0<=15.1.10
F5 BIG-IP Access Policy Manager>=16.1.0<=16.1.4
F5 BIG-IP Access Policy Manager=17.1.0
F5 BIG-IP Advanced Firewall Manager>=13.1.0<=13.1.5
F5 BIG-IP Advanced Firewall Manager>=14.1.0<=14.1.5
F5 BIG-IP Advanced Firewall Manager>=15.1.0<=15.1.10
F5 BIG-IP Advanced Firewall Manager>=16.1.0<=16.1.4
F5 BIG-IP Advanced Firewall Manager=17.1.0
F5 BIG-IP Advanced WAF/ASM>=13.1.0<=13.1.5
F5 BIG-IP Advanced WAF/ASM>=14.1.0<=14.1.5
F5 BIG-IP Advanced WAF/ASM>=15.1.0<=15.1.10
F5 BIG-IP Advanced WAF/ASM>=16.1.0<=16.1.4
F5 BIG-IP Advanced WAF/ASM=17.1.0
F5 BIG-IP Analytics>=13.1.0<=13.1.5
F5 BIG-IP Analytics>=14.1.0<=14.1.5
F5 BIG-IP Analytics>=15.1.0<=15.1.10
F5 BIG-IP Analytics>=16.1.0<=16.1.4
F5 BIG-IP Analytics=17.1.0
f5 big-ip application acceleration manager>=13.1.0<=13.1.5
f5 big-ip application acceleration manager>=14.1.0<=14.1.5
f5 big-ip application acceleration manager>=15.1.0<=15.1.10
f5 big-ip application acceleration manager>=16.1.0<=16.1.4
f5 big-ip application acceleration manager=17.1.0
F5 BIG-IP Application Security Manager>=13.1.0<=13.1.5
F5 BIG-IP Application Security Manager>=14.1.0<=14.1.5
F5 BIG-IP Application Security Manager>=15.1.0<=15.1.10
F5 BIG-IP Application Security Manager>=16.1.0<=16.1.4
F5 BIG-IP Application Security Manager=17.1.0
F5 BIG-IP Application Visibility and Reporting>=13.1.0<=13.1.5
F5 BIG-IP Application Visibility and Reporting>=14.1.0<=14.1.5
F5 BIG-IP Application Visibility and Reporting>=15.1.0<=15.1.10
F5 BIG-IP Application Visibility and Reporting>=16.1.0<=16.1.4
F5 BIG-IP Application Visibility and Reporting=17.1.0
F5 BIG-IP Carrier-Grade NAT>=13.1.0<=13.1.5
F5 BIG-IP Carrier-Grade NAT>=14.1.0<=14.1.5
F5 BIG-IP Carrier-Grade NAT>=15.1.0<=15.1.10
F5 BIG-IP Carrier-Grade NAT>=16.1.0<=16.1.4
F5 BIG-IP Carrier-Grade NAT=17.1.0
F5 BIG-IP DDoS Hybrid Defender>=13.1.0<=13.1.5
F5 BIG-IP DDoS Hybrid Defender>=14.1.0<=14.1.5
F5 BIG-IP DDoS Hybrid Defender>=15.1.0<=15.1.10
F5 BIG-IP DDoS Hybrid Defender>=16.1.0<=16.1.4
F5 BIG-IP DDoS Hybrid Defender=17.1.0
f5 big-ip domain name system>=13.1.0<=13.1.5
f5 big-ip domain name system>=14.1.0<=14.1.5
f5 big-ip domain name system>=15.1.0<=15.1.10
f5 big-ip domain name system>=16.1.0<=16.1.4
f5 big-ip domain name system=17.1.0
f5 big-ip fraud protection service>=13.1.0<=13.1.5
f5 big-ip fraud protection service>=14.1.0<=14.1.5
f5 big-ip fraud protection service>=15.1.0<=15.1.10
f5 big-ip fraud protection service>=16.1.0<=16.1.4
f5 big-ip fraud protection service=17.1.0
F5 BIG-IP Global Traffic Manager>=13.1.0<=13.1.5
F5 BIG-IP Global Traffic Manager>=14.1.0<=14.1.5
F5 BIG-IP Global Traffic Manager>=15.1.0<=15.1.10
F5 BIG-IP Global Traffic Manager>=16.1.0<=16.1.4
F5 BIG-IP Global Traffic Manager=17.1.0
f5 big-ip link controller>=13.1.0<=13.1.5
f5 big-ip link controller>=14.1.0<=14.1.5
f5 big-ip link controller>=15.1.0<=15.1.10
f5 big-ip link controller>=16.1.0<=16.1.4
f5 big-ip link controller=17.1.0
F5 BIG-IP Local Traffic Manager>=13.1.0<=13.1.5
F5 BIG-IP Local Traffic Manager>=14.1.0<=14.1.5
F5 BIG-IP Local Traffic Manager>=15.1.0<=15.1.10
F5 BIG-IP Local Traffic Manager>=16.1.0<=16.1.4
F5 BIG-IP Local Traffic Manager=17.1.0
F5 BIG-IP Next=20.0.1
F5 BIG-IP Next Service Proxy for Kubernetes>=1.5.0<=1.8.2
F5 BIG-IP Policy Enforcement Manager>=13.1.0<=13.1.5
F5 BIG-IP Policy Enforcement Manager>=14.1.0<=14.1.5
F5 BIG-IP Policy Enforcement Manager>=15.1.0<=15.1.10
F5 BIG-IP Policy Enforcement Manager>=16.1.0<=16.1.4
F5 BIG-IP Policy Enforcement Manager=17.1.0
F5 BIG-IP SSL Orchestrator>=13.1.0<=13.1.5
F5 BIG-IP SSL Orchestrator>=14.1.0<=14.1.5
F5 BIG-IP SSL Orchestrator>=15.1.0<=15.1.10
F5 BIG-IP SSL Orchestrator>=16.1.0<=16.1.4
F5 BIG-IP SSL Orchestrator=17.1.0
F5 BIG-IP WebAccelerator>=13.1.0<=13.1.5
F5 BIG-IP WebAccelerator>=14.1.0<=14.1.5
F5 BIG-IP WebAccelerator>=15.1.0<=15.1.10
F5 BIG-IP WebAccelerator>=16.1.0<=16.1.4
F5 BIG-IP WebAccelerator=17.1.0
F5 WebSafe>=13.1.0<=13.1.5
F5 WebSafe>=14.1.0<=14.1.5
F5 WebSafe>=15.1.0<=15.1.10
F5 WebSafe>=16.1.0<=16.1.4
F5 WebSafe=17.1.0
f5 nginx>=1.9.5<=1.25.2
F5 NGINX Ingress Controller>=2.0.0<=2.4.2
F5 NGINX Ingress Controller>=3.0.0<=3.3.0
NGINX Plus>=r25<r29
NGINX Plus=r29
NGINX Plus=r30
Apache Tomcat>=8.5.0<=8.5.93
Apache Tomcat>=9.0.0<=9.0.80
Apache Tomcat>=10.1.0<=10.1.13
Apache Tomcat=11.0.0-milestone1
Apache Tomcat=11.0.0-milestone10
Apache Tomcat=11.0.0-milestone11
Apache Tomcat=11.0.0-milestone2
Apache Tomcat=11.0.0-milestone3
Apache Tomcat=11.0.0-milestone4
Apache Tomcat=11.0.0-milestone5
Apache Tomcat=11.0.0-milestone6
Apache Tomcat=11.0.0-milestone7
Apache Tomcat=11.0.0-milestone8
Apache Tomcat=11.0.0-milestone9
Apple SwiftNIO HTTP/2<1.28.0
gRPC Go<1.56.3
gRPC Go>=1.58.0<1.58.3
gRPC Go=1.57.0
Microsoft .NET Framework>=6.0.0<6.0.23
Microsoft .NET Framework>=7.0.0<7.0.12
Microsoft ASP.NET Core>=6.0.0<6.0.23
Microsoft ASP.NET Core>=7.0.0<7.0.12
Microsoft Azure Kubernetes Service<2023-10-08
Microsoft Visual Studio 2022>=17.0<17.2.20
Microsoft Visual Studio 2022>=17.4<17.4.12
Microsoft Visual Studio 2022>=17.6<17.6.8
Microsoft Visual Studio 2022>=17.7<17.7.5
Microsoft Windows 10 Version 1607 x86<10.0.14393.6351
Microsoft Windows 10 Version 1607 x86<10.0.14393.6351
Microsoft Windows 10 1809<10.0.17763.4974
Microsoft Windows 10 21h2<10.0.19044.3570
Microsoft Windows 10 22h2<10.0.19045.3570
Microsoft Windows 11 21h2<10.0.22000.2538
Microsoft Windows 11 22h2<10.0.22621.2428
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows Server 2022
Node.js<21.0.0
Microsoft CBL-Mariner<2023-10-11
H2O.ai H2O<2023-10-10
Facebook Proxygen<2023.10.16.00
Apache APISIX<3.6.1
Apache Traffic Server>=8.0.0<8.1.9
Apache Traffic Server>=9.0.0<9.2.3
OpenSearch Data Prepper<2.5.0
Debian GNU/Linux=10.0
Debian GNU/Linux=11.0
Debian GNU/Linux=12.0
kazu-yamamoto http2<4.2.2
Istio Istio<1.17.6
Istio Istio>=1.18.0<1.18.3
Istio Istio>=1.19.0<1.19.1
Varnish Cache project Varnish Cache<2023-10-10
Traefik<2.10.5
Traefik=3.0.0-beta1
Traefik=3.0.0-beta2
Traefik=3.0.0-beta3
Project Contour for Kubernetes<2023-10-11
Linkerd Linkerd>=2.12.0<=2.12.5
Linkerd Linkerd=2.13.0
Linkerd Linkerd=2.13.1
Linkerd Linkerd=2.14.0
Linkerd Linkerd=2.14.1
Line Corporation Armeria<1.26.0
Red Hat 3scale API Management Platform=2.0
redhat advanced cluster management for kubernetes=2.0
Red Hat Advanced Cluster Security=3.0
Red Hat Advanced Cluster Security=4.0
redhat ANSIBLE automation platform=2.0
Red Hat Build of OptaPlanner=8.0
Red Hat Quarkus
redhat Ceph storage=5.0
Red Hat Cert Manager Operator for Red Hat OpenShift
Red Hat Enterprise Linux=8.0
Red Hat Enterprise Linux=9.0
Red Hat Cost Management
Red Hat Cryostat=2.0
redhat decision manager=7.0
Red Hat Fence Agents Remediation Operator
Apache Camel
Apache Camel
Red Hat Integration - Service Registry
redhat jboss a-mq=7
Red Hat JBoss A-MQ Streams
redhat jboss core services
redhat jboss data grid=7.0.0
redhat jboss enterprise application platform=6.0.0
redhat jboss enterprise application platform=7.0.0
Red Hat JBoss Fuse=6.0.0
Red Hat JBoss Fuse=7.0.0
Red Hat Logging Subsystem for Red Hat OpenShift
Red Hat Machine Deletion Remediation Operator
Red Hat Migration Toolkit for Applications=6.0
redhat migration toolkit for containers
Red Hat Migration Toolkit for Virtualization
Red Hat Network Observability Operator
redhat node healthcheck operator
Red Hat Node Maintenance Operator
Red Hat OpenShift AWS
Red Hat OpenShift API for Data Protection
redhat openshift container platform=4.0
Red Hat OpenShift Container Platform Assisted Installer
Red Hat OpenShift Data Science
Red Hat OpenShift Dev Spaces
Red Hat OpenShift Developer Tools and Services
Red Hat OpenShift Distributed Tracing
Red Hat OpenShift GitOps
Red Hat OpenShift Pipelines
Red Hat OpenShift Sandboxed Containers
Red Hat OpenShift Secondary Scheduler Operator
Red Hat OpenShift Serverless
redhat openshift service mesh=2.0
Red Hat OpenShift Virtualization=4
Red Hat OpenStack Platform=16.1
Red Hat OpenStack Platform=16.2
Red Hat OpenStack Platform=17.1
Red Hat Process Automation Manager=7.0
redhat quay=3.0.0
Red Hat Run Once Duration Override Operator
redhat satellite=6.0
Red Hat Self Node Remediation Operator
Red Hat Service Interconnect=1.0
redhat single sign-on=7.0
Red Hat Support for Spring Boot
redhat web terminal
Red Hat Enterprise Linux=6.0
Red Hat Enterprise Linux=8.0
Red Hat Enterprise Linux=9.0
Red Hat Service Telemetry Framework=1.5
Red Hat Enterprise Linux=8.0
Fedoraproject Fedora=38
NetApp Astra Control Center
Lightbend Akka HTTP<10.5.3
Kong Gateway<3.4.2
gRPC<=1.59.2
Node.js>=18.0.0<18.18.2
Node.js>=20.0.0<20.8.1
linkerd>=2.12.0<=2.12.5
linkerd=2.13.0
linkerd=2.13.1
linkerd=2.14.0
linkerd=2.14.1
All of
Red Hat Service Telemetry Framework=1.5
Red Hat Enterprise Linux=8.0
Fedoraproject Fedora=37
NetApp OnCommand Insight
Jenkins<=2.414.2
Jenkins<=2.427
Apache Solr<9.4.0
OpenResty<1.21.4.3
Cisco Connected Mobile Experiences<11.1
cisco crosswork data gateway<4.1.3
cisco crosswork data gateway=5.0
cisco crosswork zero touch provisioning<6.0.0
Cisco Data Center Network Manager
Cisco Enterprise Chat and Email
Cisco Expressway-C<x14.3.3
Cisco Firepower Threat Defense<7.4.2
Cisco IoT Field Network Director<4.11.0
Cisco Prime Access Registrar<9.3.3
cisco prime cable provisioning<7.2.1
Cisco Prime Infrastructure<3.10.4
Cisco Prime Network Registrar<11.2
Cisco Secure Dynamic Attributes Connector<2.2.0
Cisco Secure Malware Analytics<2.19.2
Cisco TelePresence Video Communication Server Firmware<x14.3.3
Cisco Ultra Cloud Core<2024.01.0
Cisco Ultra Cloud Core=2024.01.0
Cisco Ultra Cloud Core<2024.02.0
Cisco Ultra Cloud Core<2024.02.0
Cisco Unified Attendant Console Advanced
Cisco Unified Contact Center Domain Manager
Cisco IP Contact Center Enterprise
Cisco Unified Contact Center Enterprise - Live Data Server<12.6.2
Cisco Unified Contact Center Domain Manager
Cisco Fog Director<1.22
Cisco IOS XE<17.15.1
Cisco IOS XRv 9000<7.11.2
All of
Cisco Secure Web Appliance<15.1.0
Cisco Secure Web Appliance
All of
Any of
Cisco NX-OS<10.2\(7\)
Cisco NX-OS>=10.3\(1\)<10.3\(5\)
Any of
Cisco Nexus 3016Q Firmware
Cisco Nexus 3016Q
Cisco Nexus 3048 Firmware
Cisco Nexus 3064x
Cisco Nexus 3064
Cisco Nexus 3064
Cisco Nexus 3064x
Cisco Nexus 3064
Cisco Nexus 3064X Firmware
Cisco Nexus 3100
Cisco Nexus 3100v
Cisco Nexus 3100-Z firmware
Cisco Nexus 3100-V
Cisco Nexus 31108PV-V
Cisco Nexus 31108PV-V Firmware
Cisco Nexus 31108TC-V Firmware
Cisco Nexus 31128PQ
Cisco Nexus 3132C-Z Firmware
Cisco Nexus 3132Q-XL
Cisco Nexus 3132Q-V Firmware
Cisco Nexus 3132Q-X/3132Q-XL
Cisco Nexus 3132Q-X/3132Q-XL
Cisco Nexus 3132Q-X/3132Q-XL
Cisco Nexus 3164Q Firmware
Cisco Nexus 3172
Cisco Nexus 3172PQ/PQ-XL
Cisco Nexus 3172PQ/PQ-XL
Cisco Nexus 3172PQ/PQ-XL
Cisco Nexus 3172TQ Firmware
Cisco Nexus 3172TQ-XL
Cisco Nexus 3172TQ-XL Firmware
Cisco Nexus 3200
Cisco Nexus 3232
Cisco Nexus 3232C
Cisco Nexus 3232C
Cisco Nexus 3264C-E Firmware
Cisco Nexus 3264Q Firmware
Cisco Nexus 3400 Firmware
Cisco Nexus 3408-S Firmware
Cisco Nexus 34180YC Firmware
Cisco Nexus 34200YC-SM
Cisco Nexus 3432D-S Firmware
Cisco Nexus 3464C Firmware
Cisco Nexus 3500 Platform
Cisco Nexus 3524-xl
Cisco Nexus 3524-xl
Cisco Nexus 3524-x/xl
Cisco Nexus 3524-x/xl
Cisco Nexus 3548-X/XL Firmware
Cisco Nexus 3548-X/XL
Cisco Nexus 3548-x/xl
Cisco Nexus 3548-X/XL
Cisco Nexus 3600
Cisco Nexus 36180YC-R Firmware
Cisco Nexus 3636C-R Firmware
All of
Any of
Cisco NX-OS<10.2\(7\)
Cisco NX-OS>=10.3\(1\)<10.3\(5\)
Any of
Cisco NX-OS Nexus 9000 Series
Cisco Nexus 9200 firmware
Cisco Nexus 9200
Cisco Nexus 92160YC Switch
Cisco Nexus 92160YC Switch
Cisco Nexus 9221C Firmware
Cisco Nexus 92300YC Switch
Cisco Nexus 92300YC
Cisco Nexus 92304qc
Cisco Nexus 92304QC Switch
Cisco Nexus 9232E
Cisco Nexus 92348GC-X Switch
Cisco Nexus 9236c
Cisco Nexus 9236C Switch
Cisco Nexus 9272Q Switch
Cisco Nexus 9272Q Switch
Cisco Nexus 9300 Firmware
Cisco Nexus
Cisco Nexus 93108TC-EX-24 Switch
Cisco Nexus 93108TC-EX-24
Cisco Nexus 93108TC-FX Switch
Cisco Nexus 93108TC-FX Switch
Cisco Nexus 93108TC-FX3H
Cisco Nexus 93108TC-FX3P Firmware
Cisco Nexus 93120tx
Cisco Nexus 93120TX Switch
Cisco Nexus 93128TX Switch
Cisco Nexus 93128tx
Cisco Nexus 93128TX Firmware
Cisco Nexus 9316D-GX Firmware
Cisco Nexus 93180LC-EX Switch
Cisco Nexus 93180LC-EX
Cisco Nexus 93180TC-EX Firmware
Cisco Nexus 93180YC-EX
Cisco Nexus 93180YC-EX-24 Firmware
Cisco Nexus 93180YC-EX-24
Cisco Nexus 93180YC-FX Firmware
Cisco Nexus 93180YC-FX-24 Firmware
Cisco Nexus 93180YC-FX3 Firmware
Cisco Nexus 93180YC-FX3H
Cisco Nexus 93180YC-FX3S Firmware
Cisco Nexus 93216TC-FX2 Firmware
Cisco Nexus 93240TC-FX2
Cisco Nexus 93240YC-FX2 Firmware
Cisco Nexus 9332C Firmware
Cisco Nexus 9332D-GX2B firmware
Cisco Nexus 9332D-H2R
Cisco Nexus 9332pq
Cisco Nexus 9332PQ Switch
Cisco Nexus 93360YC-FX2
Cisco Nexus 9336C-FX2 Firmware
Cisco Nexus 9336C-FX2-E Firmware
Cisco Nexus N9336PQ
Cisco Nexus 9336PQ ACI Spine Switch
Cisco Nexus N9336PQ-X
Cisco Nexus 9336PQ
Cisco Nexus 9348D-GX2A
Cisco Nexus 9348GC-FX3
Cisco Nexus 9348GC-FXP Firmware
Cisco Nexus 93600CD-GX Firmware
Cisco Nexus 9364C-GX Firmware
Cisco Nexus 9364C-GX Firmware
Cisco Nexus 9364D-GX2A Firmware
Cisco Nexus 9372px
Cisco Nexus 9372PX-E Switch
Cisco Nexus 9372PX-E
Cisco Nexus 9272Q Switch
Cisco Nexus 9372tx
Cisco Nexus 9372TX-E Switch
Cisco Nexus 9372TX-E
Cisco Nexus 9272Q Switch
Cisco Nexus 9396px
Cisco Nexus 9396PX Switch
Cisco Nexus 9396tx
Cisco Nexus 9272Q Switch
Cisco Nexus 9408
Cisco Nexus 9432PQ
Cisco Nexus 9500 firmware
Cisco Nexus 9500
Cisco Nexus 9500
Cisco Nexus 9500
Cisco Nexus 9500 Supervisor A
Cisco Nexus 9500 Supervisor A+
Cisco Nexus 9500 Supervisor B firmware
Cisco Nexus 9500 Supervisor B+
Cisco Nexus 9500R Firmware
Cisco Nexus 9504
Cisco Nexus
Cisco Nexus 9508
Cisco Nexus
Cisco Nexus 9516
Cisco Nexus
Cisco Nexus 9536PQ Firmware
Cisco Nexus 9636PQ Firmware
Cisco Nexus 9716D-GX Firmware
Cisco Nexus 9736PQ Firmware
Cisco Nexus 9800 Firmware
Cisco Nexus 9804
Cisco Nexus 9808
debian/dnsdist<=1.5.1-3<=1.7.3-2
1.9.8-1
debian/grpc<=1.30.2-3<=1.51.1-3<=1.51.1-5
debian/h2o<=2.2.5+dfsg2-6<=2.2.5+dfsg2-7
2.2.5+dfsg2-11
debian/haproxy
2.2.9-2+deb11u6
2.6.12-1+deb12u1
3.0.8-1
debian/jetty9
9.4.50-4+deb11u2
9.4.50-4+deb12u3
9.4.56-1
debian/netty
1:4.1.48-4+deb11u2
1:4.1.48-7+deb12u1
1:4.1.48-10
debian/nghttp2
1.43.0-1+deb11u1
1.43.0-1+deb11u2
1.52.0-1+deb12u2
1.52.0-1+deb12u1
1.64.0-1
debian/nginx<=1.18.0-6.1+deb11u3<=1.22.1-9
1.26.3-2
debian/tomcat10
10.1.6-1+deb12u2
10.1.34-0+deb12u1
10.1.35-1
debian/tomcat9
9.0.43-2~deb11u10
9.0.43-2~deb11u11
9.0.70-2
9.0.95-1
debian/trafficserver
8.1.10+ds-1~deb11u1
8.1.11+ds-0+deb11u2
9.2.5+ds-0+deb12u1
9.2.5+ds-1
debian/varnish<=6.5.1-1+deb11u3<=7.1.1-1.1
7.6.1-2
IBM Data Virtualization on Cloud Pak for Data<=3.0
IBM Watson Query with Cloud Pak for Data<=2.2
IBM Watson Query with Cloud Pak for Data<=2.1
IBM Watson Query with Cloud Pak for Data<=2.0
IBM Data Virtualization on Cloud Pak for Data<=1.8
IBM Data Virtualization on Cloud Pak for Data<=1.7
redhat/golang<1.21.3
1.21.3
redhat/golang<1.20.10
1.20.10
redhat/tomcat<11.0.0
11.0.0
redhat/tomcat<10.1.14
10.1.14
redhat/tomcat<9.0.81
9.0.81
redhat/tomcat<8.5.94
8.5.94
redhat/nghttp2<1.57.0
1.57.0
redhat/netty<4.1.100.
4.1.100.
Fortinet FortiOS IPS Engine>=7.4.0<=7.4.1
Fortinet FortiOS IPS Engine>=7.2.0<=7.2.7
Fortinet FortiOS IPS Engine>=7.0.0<=7.0.13
Fortinet FortiProxy>=7.4.0<=7.4.1
Fortinet FortiProxy>=7.2.0<=7.2.7
Fortinet FortiProxy>=7.0
F5 BIG-IP Next (LTM)=20.0.1
20.1.0
F5 BIG-IP Next>=1.5.0<=1.8.2
F5 BIG-IP and BIG-IQ Centralized Management>=17.1.0<=17.1.1
17.1.1.3
F5 BIG-IP and BIG-IQ Centralized Management>=16.1.0<=16.1.4
16.1.4.3
F5 BIG-IP and BIG-IQ Centralized Management>=15.1.0<=15.1.10
15.1.10.4
F5 BIG-IP and BIG-IQ Centralized Management>=14.1.0<=14.1.5
F5 BIG-IP and BIG-IQ Centralized Management>=13.1.0<=13.1.5
NGINX=25
30
Nginx>=1.9.5<=1.25.2
Kubernetes Nginx Ingress Controller>=3.0.0<=3.3.0
3.3.1
Kubernetes Nginx Ingress Controller>=2.0.0<=2.4.2
Kubernetes Nginx Ingress Controller=1.12.2
Visual Studio Professional 2022=17.6
Visual Studio Professional 2022=17.2
Visual Studio Professional 2022=17.7

Remedy

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-44487?

    CVE-2023-44487 has been classified with a critical severity rating due to its potential for exploitation through rapid reset attacks in the HTTP/2 protocol.

  • How do I fix CVE-2023-44487?

    To remediate CVE-2023-44487, users should apply the security patches and updates provided by their software vendors for affected products or libraries.

  • What products are affected by CVE-2023-44487?

    CVE-2023-44487 affects multiple Microsoft Windows versions, .NET, various Debian packages, and notable server and application software relying on HTTP/2.

  • Can CVE-2023-44487 be exploited remotely?

    Yes, attackers can exploit CVE-2023-44487 remotely to disrupt services by sending malicious HTTP/2 requests that trigger rapid stream resets.

  • What is the recommended action for administrators regarding CVE-2023-44487?

    Administrators should prioritize assessing their environments for affected software, applying available updates immediately, and monitoring for suspicious activity.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203