Attacker Value
Unknown
1
CVE-2023-44487
1
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-44487
(Last updated June 28, 2024) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
n/a
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
- akka,
- amazon,
- apache,
- apple,
- caddyserver,
- cisco,
- debian,
- dena,
- eclipse,
- envoyproxy,
- f5,
- facebook,
- fedoraproject,
- golang,
- grpc,
- ietf,
- istio,
- jenkins,
- kazu-yamamoto,
- konghq,
- linecorp,
- linkerd,
- microsoft,
- netapp,
- netty,
- nghttp2,
- nodejs,
- openresty,
- projectcontour,
- redhat,
- traefik,
- varnish cache project
Products
- .net,
- 3scale api management platform 2.0,
- advanced cluster management for kubernetes 2.0,
- advanced cluster security 3.0,
- advanced cluster security 4.0,
- ansible automation platform 2.0,
- apisix,
- armeria,
- asp.net core,
- astra control center -,
- azure kubernetes service,
- big-ip access policy manager,
- big-ip access policy manager 17.1.0,
- big-ip advanced firewall manager,
- big-ip advanced firewall manager 17.1.0,
- big-ip advanced web application firewall,
- big-ip advanced web application firewall 17.1.0,
- big-ip analytics,
- big-ip analytics 17.1.0,
- big-ip application acceleration manager,
- big-ip application acceleration manager 17.1.0,
- big-ip application security manager,
- big-ip application security manager 17.1.0,
- big-ip application visibility and reporting,
- big-ip application visibility and reporting 17.1.0,
- big-ip carrier-grade nat,
- big-ip carrier-grade nat 17.1.0,
- big-ip ddos hybrid defender,
- big-ip ddos hybrid defender 17.1.0,
- big-ip domain name system,
- big-ip domain name system 17.1.0,
- big-ip fraud protection service,
- big-ip fraud protection service 17.1.0,
- big-ip global traffic manager,
- big-ip global traffic manager 17.1.0,
- big-ip link controller,
- big-ip link controller 17.1.0,
- big-ip local traffic manager,
- big-ip local traffic manager 17.1.0,
- big-ip next 20.0.1,
- big-ip next service proxy for kubernetes,
- big-ip policy enforcement manager,
- big-ip policy enforcement manager 17.1.0,
- big-ip ssl orchestrator,
- big-ip ssl orchestrator 17.1.0,
- big-ip webaccelerator,
- big-ip webaccelerator 17.1.0,
- big-ip websafe,
- big-ip websafe 17.1.0,
- build of optaplanner 8.0,
- build of quarkus -,
- caddy,
- cbl-mariner,
- ceph storage 5.0,
- cert-manager operator for red hat openshift -,
- certification for red hat enterprise linux 8.0,
- certification for red hat enterprise linux 9.0,
- connected mobile experiences,
- contour,
- cost management -,
- crosswork data gateway,
- crosswork data gateway 5.0,
- crosswork zero touch provisioning,
- cryostat 2.0,
- data center network manager -,
- debian linux 10.0,
- debian linux 11.0,
- debian linux 12.0,
- decision manager 7.0,
- enterprise chat and email -,
- enterprise linux 6.0,
- enterprise linux 8.0,
- enterprise linux 9.0,
- envoy 1.24.10,
- envoy 1.25.9,
- envoy 1.26.4,
- envoy 1.27.0,
- expressway,
- fedora 37,
- fedora 38,
- fence agents remediation operator -,
- firepower threat defense,
- fog director,
- go,
- grpc,
- grpc 1.57.0,
- h2o,
- http 2.0,
- http server,
- http2,
- integration camel for spring boot -,
- integration camel k -,
- integration service registry -,
- ios xe,
- ios xr,
- iot field network director,
- istio,
- jboss a-mq 7,
- jboss a-mq streams -,
- jboss core services -,
- jboss data grid 7.0.0,
- jboss enterprise application platform 6.0.0,
- jboss enterprise application platform 7.0.0,
- jboss fuse 6.0.0,
- jboss fuse 7.0.0,
- jenkins,
- jetty,
- kong gateway,
- linkerd,
- linkerd 2.13.0,
- linkerd 2.13.1,
- linkerd 2.14.0,
- linkerd 2.14.1,
- logging subsystem for red hat openshift -,
- machine deletion remediation operator -,
- migration toolkit for applications 6.0,
- migration toolkit for containers -,
- migration toolkit for virtualization -,
- netty,
- network observability operator -,
- networking,
- nghttp2,
- nginx,
- nginx ingress controller,
- nginx plus,
- nginx plus r29,
- nginx plus r30,
- node healthcheck operator -,
- node maintenance operator -,
- node.js,
- nx-os,
- oncommand insight -,
- openresty,
- opensearch data prepper,
- openshift -,
- openshift api for data protection -,
- openshift container platform 4.0,
- openshift container platform assisted installer -,
- openshift data science -,
- openshift dev spaces -,
- openshift developer tools and services -,
- openshift distributed tracing -,
- openshift gitops -,
- openshift pipelines -,
- openshift sandboxed containers -,
- openshift secondary scheduler operator -,
- openshift serverless -,
- openshift service mesh 2.0,
- openshift virtualization 4,
- openstack platform 16.1,
- openstack platform 16.2,
- openstack platform 17.1,
- prime access registrar,
- prime cable provisioning,
- prime infrastructure,
- prime network registrar,
- process automation 7.0,
- proxygen,
- quay 3.0.0,
- run once duration override operator -,
- satellite 6.0,
- secure dynamic attributes connector,
- secure malware analytics,
- secure web appliance firmware,
- self node remediation operator -,
- service interconnect 1.0,
- service telemetry framework 1.5,
- single sign-on 7.0,
- solr,
- support for spring boot -,
- swiftnio http/2,
- telepresence video communication server,
- tomcat,
- tomcat 11.0.0,
- traefik,
- traefik 3.0.0,
- traffic server,
- ultra cloud core - policy control function,
- ultra cloud core - policy control function 2024.01.0,
- ultra cloud core - serving gateway function,
- ultra cloud core - session management function,
- unified attendant console advanced -,
- unified contact center domain manager -,
- unified contact center enterprise -,
- unified contact center enterprise - live data server,
- unified contact center management portal -,
- varnish cache,
- visual studio 2022,
- web terminal -,
- windows 10 1607,
- windows 10 1809,
- windows 10 21h2,
- windows 10 22h2,
- windows 11 21h2,
- windows 11 22h2,
- windows server 2016 -,
- windows server 2019 -,
- windows server 2022 -
Exploited in the Wild
inokii
indicated sources as
- Government or Industry Alert (https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
- News Article or Blog (https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/)
- Other: CISA Gov Alert (https://www.cisa.gov/news-events/alerts/2023/10/10/cisa-adds-five-known-vulnerabilities-catalog)
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Advisory
Exploit
PoCs that have not been added by contributors directly have been sourced from:
nomi-sec/PoC-in-GitHub.
A PoC added here by the AKB Worker must have at least 2 GitHub stars.
A PoC added here by the AKB Worker must have at least 2 GitHub stars.
cve-2023-44487 (https://github.com/nxenon/cve-2023-44487) (Added by AKB Worker)
CVE-2023-44487 (https://github.com/imabee101/CVE-2023-44487) (Added by AKB Worker)
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: