QID 92067

Date Published: 2023-10-11

QID 92067: Microsoft HTTP/2 Protocol Distributed Denial of Service (DoS) Vulnerability

CVE-2023-44487: The HTTP/2 protocol is vulnerable to Distributed Denial of Service (DDoS) attack also known as 'HTTP/2 Rapid Reset' attack. This allows malicious actors to launch a DDoS attack targeting HTTP/2 servers.

Affected Products:
Windows Server 2019
Windows Server 2016
Windows Server 2022
Windows 11 Version 21H2
Windows 11 Version 22H2
Windows 10 Version 21H2
Windows 10 Version 22H2
Windows 10 Version 1607
Microsoft Windows 10 Version 1809
.NET 7.0 and 6.0
ASP.NET Core 7.0 and 6.0
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.6
Microsoft Visual Studio 2022 version 17.7

QID Detection Logic:
Windows: This QID checks for the file version of 'http.sys'.
.Net:
On Windows, this QID detects vulnerable versions of Microsoft .NET by checking the file version.
On Linux, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" and "/root/shared/Microsoft.NETCore.App" folders.
On Mac, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" folder.
Asp.Net: The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.
Visual Studio: This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.

Successful exploitation of this vulnerability may allow an attacker targeting HTTP/2 servers to consume server resource significantly leads to denial of service.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to refer to Microsoft Security Advisory for more information pertaining to this vulnerability.
    Workaround:
    Microsoft strongly recommends that you install the updates for this vulnerability as soon as possible even if you plan to leave either of these workarounds in place:

    1. Disable the HTTP/2 protocol on your web server by using the Registry Editor
    2. Include a protocols setting for each Kestral endpoint to limit your application to HTTP1.1

    Vendor References

    CVEs related to QID 92067

    Software Advisories
    Advisory ID Software Component Link
    Microsoft Security Advisory URL Logo msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487