Skip to content
Threat Feed
medium advisory

HTTP/2 Implementations Vulnerability Enables Denial of Service

A remote, anonymous attacker can exploit a vulnerability in various HTTP/2 implementations to perform a denial-of-service attack.

A vulnerability exists in multiple HTTP/2 implementations that can be exploited by an unauthenticated, remote attacker to conduct a denial-of-service (DoS) attack. The specific details of the vulnerability aren’t disclosed in this brief, but the generic nature of the vulnerability means a wide array of servers are possibly vulnerable. Defenders need to focus on detecting anomalous HTTP/2 traffic patterns, given the lack of a specific CVE or patch information in the original source.

Attack Chain

  1. The attacker establishes an HTTP/2 connection with a vulnerable server.
  2. The attacker sends a series of specially crafted HTTP/2 requests. Due to the vulnerability, these requests consume excessive server resources.
  3. The server begins to experience performance degradation due to resource exhaustion (CPU, memory, or network bandwidth).
  4. Legitimate user requests are delayed or dropped as the server struggles to process the malicious traffic.
  5. The attacker continues to send malicious HTTP/2 requests, sustaining the resource exhaustion.
  6. The server becomes unresponsive, resulting in a denial-of-service condition for legitimate users.

Impact

Successful exploitation of this vulnerability leads to a denial-of-service condition, rendering affected servers and services unavailable. The number of potential victims is broad, encompassing any system utilizing a vulnerable HTTP/2 implementation. The impact ranges from temporary service outages to prolonged periods of unavailability, causing business disruption and potential financial losses.

Recommendation

  • Monitor web server logs for anomalous HTTP/2 traffic patterns, specifically focusing on request rates and resource consumption (CPU, memory, network) using the provided Sigma rule.
  • Implement rate limiting for HTTP/2 connections to mitigate the impact of excessive requests.
  • Consider deploying a Web Application Firewall (WAF) to inspect and filter HTTP/2 traffic for known malicious patterns.

Detection coverage 2

Detect High Rate of HTTP/2 Requests from Single IP

medium

Detects a high rate of HTTP/2 requests originating from a single IP address, potentially indicating a DoS attack.

sigma tactics: availability techniques: T1498 sources: webserver, linux

Detect HTTP/2 Request Flooding - Multiple IPs

high

Detects a flood of HTTP/2 requests coming from multiple unique IPs in a short timeframe.

sigma tactics: availability techniques: T1498 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →