First published: Thu Feb 08 2024(Updated: )
The Fortinet Product Security team has evaluated the impact of the vulnerablity HTTP/2 Rapid Reset Attack, listed below:CVE-2023-44487:The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly.https://nvd.nist.gov/vuln/detail/CVE-2023-44487
Affected Software | Affected Version | How to fix |
---|---|---|
>=7.4.0<=7.4.1 | ||
>=7.2.0<=7.2.7 | ||
>=7.0.0<=7.0.13 | ||
>=7.4.0<=7.4.1 | ||
>=7.2.0<=7.2.7 | ||
>=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
FG-IR-23-397 is rated as a denial of service vulnerability impacting server resource consumption.
To fix FG-IR-23-397, upgrade FortiOS to version 7.4.2 or later, or FortiProxy to version 7.4.2 or later, depending on your product.
FortiOS versions 7.4.0 to 7.4.1, 7.2.0 to 7.2.7, and 7.0.0 to 7.0.13 are affected by FG-IR-23-397.
The impact of FG-IR-23-397 is that it can allow attackers to exploit the HTTP/2 protocol to cause denial of service by quickly resetting multiple streams.
Yes, FG-IR-23-397 affects FortiProxy versions 7.4.0 to 7.4.1, 7.2.0 to 7.2.7, and all versions of 7.0.