Jan 1, 2026·12 min read·10 visits
A critical vulnerability in the HTTP/2 protocol allows attackers to cause a massive denial-of-service attack. By rapidly opening and then immediately canceling many data streams, an attacker can force a server to expend huge amounts of CPU, knocking it offline. This 'Rapid Reset' attack is cheap to perform and affects nearly every web server running HTTP/2. Patching and rate-limiting are essential for mitigation.
CVE-2023-44482, dubbed 'HTTP/2 Rapid Reset,' is a critical denial-of-service vulnerability affecting the HTTP/2 protocol itself. By exploiting the stream cancellation feature, an attacker can overwhelm virtually any web server with minimal effort. This is not a simple bug in a single application but a fundamental weakness in the web's modern infrastructure, allowing a low-bandwidth attacker to trigger massive, resource-draining DDoS attacks. The flaw lies in the asymmetrical cost of handling stream resets, where a cheap client request forces expensive server-side cleanup, leading to CPU exhaustion and complete service unavailability.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
nginx F5 | < 1.25.3 | 1.25.3 |
Go Google | < 1.20.10 and < 1.21.3 | 1.20.10, 1.21.3 |
Node.js OpenJS Foundation | < 20.8.0, < 18.18.0 | 20.8.0, 18.18.0 |
Envoy Cloud Native Computing Foundation | < 1.27.1 | 1.27.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-400 |
| CWE Name | Uncontrolled Resource Consumption |
| Attack Vector | Network |
| CVSS v3.1 | 7.5 (High) |
| Impact | Denial of Service |
| Exploit Status | Active Exploitation |
| CISA KEV | Yes, listed |
| EPSS Percentile | 96.53% (as of late 2023) |
The software does not properly control the allocation and maintenance of a limited resource, which can lead to exhaustion of that resource.