<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2266 Information about the HTTP/2 Rapid Reset DDoS Vulnerability (CVE-2023-44487)</title><link>https://community.appian.com/support/w/kb/3389/kb-2266-information-about-the-http-2-rapid-reset-ddos-vulnerability-cve-2023-44487</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2266 Information about the HTTP/2 Rapid Reset DDoS Vulnerability (CVE-2023-44487)</title><link>https://community.appian.com/support/w/kb/3389/kb-2266-information-about-the-http-2-rapid-reset-ddos-vulnerability-cve-2023-44487</link><pubDate>Fri, 13 Oct 2023 21:29:24 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:a45e818d-06a0-430f-b8a4-88dcf6feb2d7</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3389/kb-2266-information-about-the-http-2-rapid-reset-ddos-vulnerability-cve-2023-44487#comments</comments><description>Current Revision posted to Appian Knowledge Base by Kevin Kleinegger on 10/13/2023 9:29:24 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On October 10, 2023, CISA released a &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations utilizing HTTP/2 services concerning a Denial of Service (DoS) vulnerability exploited in the wild from August 2023 through October 2023.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is affected by CVE-2023-44487 but is not currently vulnerable to exploitation due to the following compensating controls:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Per an &lt;/span&gt;&lt;a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"&gt;&lt;span style="font-weight:400;"&gt;AWS security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; released on October 10, 2023, Amazon Cloudfront is able to mitigate HTTP request floods. All Appian instances within the Appian Cloud environment are protected by AWS load balancers, providing a measure of protection from public exposure to the DoS vulnerability&amp;rsquo;s attack vector.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian&amp;rsquo;s Engineering teams are currently working to upgrade all instances of Apache Web Server, Apache Tomcat, nginx, and Eclipse Jetty to versions containing the remediation for CVE-2023-44487.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers will need to evaluate their implementation of the Appian platform in their environment and identify if there are mitigating controls in place for this vulnerability, such as an AWS load balancer with DoS protections.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Exploitation:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;As of October 13, 2023, Appian has received no indications of CVE-2023-44487 vulnerability exploitation on any Appian instances.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-44487&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;HTTP/2 Rapid Reset Attack Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"&gt;&lt;span style="font-weight:400;"&gt;https://aws.amazon.com/security/security-bulletins/AWS-2023-011/&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: October 13, 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>[SP-9275 DRAFT] Information about the HTTP/2 Rapid Reset DDoS Vulnerability (CVE-2023-44487)</title><link>https://community.appian.com/support/w/kb/3389/kb-2266-information-about-the-http-2-rapid-reset-ddos-vulnerability-cve-2023-44487/revision/1</link><pubDate>Fri, 13 Oct 2023 21:22:52 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:a45e818d-06a0-430f-b8a4-88dcf6feb2d7</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3389/kb-2266-information-about-the-http-2-rapid-reset-ddos-vulnerability-cve-2023-44487#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Kevin Kleinegger on 10/13/2023 9:22:52 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On October 10, 2023, CISA released a &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations utilizing HTTP/2 services concerning a Denial of Service (DoS) vulnerability exploited in the wild from August 2023 through October 2023.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is affected by CVE-2023-44487 but is not currently vulnerable to exploitation due to the following compensating controls:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;Per an &lt;/span&gt;&lt;a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"&gt;&lt;span style="font-weight:400;"&gt;AWS security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; released on October 10, 2023, Amazon Cloudfront is able to mitigate HTTP request floods. All Appian instances within the Appian Cloud environment are protected by AWS load balancers, providing a measure of protection from public exposure to the DoS vulnerability&amp;rsquo;s attack vector.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian&amp;rsquo;s Engineering teams are currently working to upgrade all instances of Apache Web Server, Apache Tomcat, nginx, and Eclipse Jetty to versions containing the remediation for CVE-2023-44487.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers will need to evaluate their implementation of the Appian platform in their environment and identify if there are mitigating controls in place for this vulnerability, such as an AWS load balancer with DoS protections.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Exploitation:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;As of October 13, 2023, Appian has received no indications of CVE-2023-44487 vulnerability exploitation on any Appian instances.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-44487&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;HTTP/2 Rapid Reset Attack Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"&gt;&lt;span style="font-weight:400;"&gt;https://aws.amazon.com/security/security-bulletins/AWS-2023-011/&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: October 13, 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item></channel></rss>