First published: Tue Oct 10 2023(Updated: )
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. (CVE-2023-44487 also known as HTTP/2 Rapid Reset Attack)
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next | =20.0.1 | 20.1.0 |
F5 BIG-IP Service Proxy for Kubernetes | >=1.5.0<=1.8.2 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | 17.1.1.3 |
F5 BIG-IP | >=16.1.0<=16.1.4 | 16.1.4.3 |
F5 BIG-IP | >=15.1.0<=15.1.10 | 15.1.10.4 |
F5 BIG-IP | >=14.1.0<=14.1.5 | |
F5 BIG-IP | >=13.1.0<=13.1.5 | |
NGINX Plus | =25 | 30 |
NGINX Open Source | >=1.9.5<=1.25.2 | |
F5 NGINX Ingress Controller | >=3.0.0<=3.3.0 | 3.3.1 |
F5 NGINX Ingress Controller | >=2.0.0<=2.4.2 | |
F5 NGINX Ingress Controller | =1.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000137106 is high due to its potential for denial of service through HTTP/2 rapid reset attacks.
To fix F5-K000137106, you should upgrade to the latest version of the affected software with the specified remedies.
F5-K000137106 affects several products including F5 BIG-IP and F5 NGINX, across various versions.
F5-K000137106 was actively exploited in the wild from August to October 2023.
F5-K000137106 relates to a denial of service attack caused by rapid request cancellation in the HTTP/2 protocol.