By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Shifting Sands: Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape
    23 February 2023
    How to Stay Ahead of Mobility Tax & Compliance Trends
    23 January 2024
    The Long and Winding Road to Custom-AI Compliance
    2 August 2024
    Latest News
    Fractured & Fraught — but Still Potentially Profitable: The State of ESG in 2025
    7 November 2025
    UK AML Reform in 2025: A Public Recalibration of Risk and Responsibility
    1 November 2025
    US National Security Compliance Risk & Readiness Report
    26 October 2025
    What Would a Farage Government Mean for Compliance?
    20 October 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    AI and Trust – Schneier on Security
    29 March 2024
    New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware
    4 April 2024
    Apple Expands Spyware Alert System to Warn Users of Mercenary Attacks
    11 April 2024
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    5 Places to Never Put Your Amazon Echo
    19 April 2024
    Meta’s ‘set it and forget it’ AI ad tools are misfiring and blowing through cash
    28 April 2024
    C’mon, Why Isn’t the New Apple Pencil Pro Backward Compatible?
    8 May 2024
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Missing Chinese banker was working to set up Singapore family office
    22 February 2023
    European countries step up delivery of tanks to Ukraine
    23 February 2023
    Borealis Foods to Go Public via Merger with Oxus Acquisition Corp
    24 February 2023
    Latest News
    US Supreme Court lets Trump withhold $4 billion in food aid funding for now
    8 November 2025
    Client Challenge
    7 November 2025
    WeRide CEO pitches robotaxi safety as shares start trading in HK
    6 November 2025
    Naver reports record Q3 earnings on AI-driven growth
    5 November 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Stream episode From Black Hat To White Hat. Ex-Hacker Now Fights Cybercrime. Bastien Treptel, CTRL Group. by Cybercrime Magazine podcast
    4 July 2024
    This Week In Tech. Solos Introduces Smart Glasses, Hollywood's De-Aging Tech. WCYB Digital Radio.
    12 July 2024
    The Ransomware Victim Experience. Hacking's Harmful Toll. Sherrod DeGrippo, Top Cybersecurity Expert
    20 July 2024
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: Exploiting HTTP/2 CONTINUATION frames for DoS attacks
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Application Security > Exploiting HTTP/2 CONTINUATION frames for DoS attacks
Application Security

Exploiting HTTP/2 CONTINUATION frames for DoS attacks

webmaster
Last updated: 2024/04/08 at 7:44 PM
webmaster
Share
4 Min Read
SHARE

Contents
About the vulnerabilityAffected versionsImpact MitigationSolutionDetecting vulnerabilities with SnykReferences

About the vulnerability

The vulnerability lies in the way HTTP/2 implementations handle CONTINUATION frames, which are used to transmit header blocks larger than the maximum frame size. Attackers exploit this weakness by sending an excessive number of CONTINUATION frames within a single HTTP/2 stream. This flood of frames overwhelms the server’s capacity to process them efficiently.

The severity of this vulnerability was highlighted by Bartek Nowotarski, who noted that it poses a more significant threat compared to previous incidents, such as the ‘HTTP/2 Rapid Reset’ attack. Furthermore, this vulnerability has been actively exploited since August 2023.

What makes this attack particularly concerning is its potential to crash web servers with just a single TCP connection or even just a handful of frames. As a result, affected servers may experience substantial performance degradation or complete unavailability.

This vulnerability affects a wide range of vendors and HTTP/2 libraries, including but not limited to Red Hat, SUSE Linux, Arista Networks, the Apache HTTP Server Project, nghttp2, Node.js, AMPHP, and the Go Programming Language.

Affected versions

Impact 

Given the widespread use of HTTP/2 and its prevalence in internet traffic (estimated to be above 70% by Cloudflare Radar), the impact of this vulnerability is significant. It underscores the critical need for prompt patching and robust security measures to mitigate the risk of exploitation and protect web servers from devastating denial of service (DoS) and security restriction bypass attacks.

Mitigation

Update the impacted program to the most recent version, with the vulnerability patched in. If a patch is not available, consider temporarily turning off HTTP/2 on the server.

Solution

Patch and update: Ensure the most recent security updates are applied to your server software, relevant libraries, and HTTP/2 implementations. Check software suppliers’ updates frequently, and when updates are available, install them right away to fix known vulnerabilities.

Put rate limiting into practice: Set rate limits to limit the number of requests or frames that may be handled in a given amount of time. This may lessen the effects of heavy traffic or floods.

Analyze and monitor traffic: Keep an eye out for any odd patterns or spikes in incoming traffic that could point to a possible assault. Examine unprocessed HTTP traffic to detect and address malicious requests that take advantage of holes in HTTP/2 implementations.

Use web application firewalls (WAFs): Set up WAFs to filter incoming traffic and stop malicious requests from reaching your server. Set up WAF rules to identify and stop known attack patterns linked to DoS assaults on HTTP/2.

Put network-level defenses into practice: To identify and stop suspicious traffic patterns suggestive of DoS attacks aimed at HTTP/2 implementations, employ network-level defenses like intrusion detection systems (IDS) or intrusion prevention systems (IPS).

Diversify server implementations: Work toward distributing your server implementations among other projects or providers. This can increase resistance to attacks and lessen the effect of vulnerabilities unique to a given implementation.

Detecting vulnerabilities with Snyk

  1. amphp/http (CVE-2024-2653) – Allocation of Resources Without Limits or Throttling

  2. Apache HTTP Server (CVE-2024-27316) – Uncontrolled Resource Consumption (‘Resource Exhaustion’)

  3. Apache Tomcat (CVE-2024-24549) – Improper Input Validation

  4. Apache Traffic Server (CVE-2024-31309) – Uncontrolled Resource Consumption (‘Resource Exhaustion’)

  5. Envoy proxy (CVE-2024-27919 and CVE-2024-30255) – Detection of Error Condition Without Action and Uncontrolled Resource Consumption (‘Resource Exhaustion’) 

  6. Golang (CVE-2023-45288) – Resource Exhaustion

  7. h2 Rust crate

  8. nghttp2 (CVE-2024-28182) – Resource Exhaustion

  9. Node.js (CVE-2024-27983)  – Resource Exhaustion

  10. Tempesta FW (CVE-2024-2758) – Allocation of Resources Without Limits or Throttling 

References

  1. https://nowotarski.info/

  2. https://nowotarski.info/http2-continuation-flood-technical-details/#reachable-assertion-crash-nodejs-special-case 

  3. https://datatracker.ietf.org/doc/html/rfc7540 

  4. https://www.securityweek.com/new-http-2-dos-attack-potentially-more-severe-than-record-breaking-rapid-reset/

You Might Also Like

Understanding prompt injections: a frontier security challenge

AI progress and recommendations

Introducing the Teen Safety Blueprint

From Pilot to Practice: How BBVA Is Scaling AI Across the Organization

How CRED is tapping AI to deliver premium customer experiences

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Top 8 Best Smart Door Locks In 2024
Next Article Are You a Victim of a Deepfake Attack? Here’s What to Do Next
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

This Week in Scams: Fake Steaks and Debit Card Porch Pirates
network vulnerability 8 November 2025
Gotthard Pass to close on Friday
SWITZERLAND 8 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 8 November 2025
Swiss Reformed Church follows Catholics and launches sexual abuse inquiry
SWITZERLAND 8 November 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?