Lucene search

K
impervablogKunal AnandIMPERVABLOG:5CCEB643859A2AD0988C9CB6DA939741
HistoryOct 10, 2023 - 12:24 p.m.

Protecting Against HTTP/2 Rapid Reset: CVE-2023-44487

2023-10-1012:24:39
Kunal Anand
www.imperva.com
78
http/2
cve-2023-44487
zero-day vulnerability
imperva
ddos mitigation
cloud waf
security collaboration
patch

EPSS

0.708

Percentile

98.1%

Today, Google disclosed a zero-day vulnerability in the HTTP/2 protocol. Imperva collaborated proactively with Google to gain advanced insights into this vulnerability.

After a comprehensive inspection of this vulnerability by Imperva’s Product Development and Threat Research teams, we can confirm that Imperva’s existing DDoS mitigation strategies effectively defend this specific attack vector. Our Cloud DDoS and Cloud WAF customers remain secure. Our WAF Gateway customers will soon be notified of a patch to handle this vulnerability.

Going forward, Imperva’s Threat Research team will monitor this vulnerability to prevent potential exploitation. We are committed to releasing patches, updates, and further details as necessary.

Our quick and continued response to threats like HTTP/2 Rapid Reset demonstrates why Imperva is a trusted advisor to our customers. It is also a reminder of the critical value our combination of market-leading products and services provides and our unique impact on the success of our customers’ businesses.

As a member of the security community, Imperva values its collaborations with companies such as Google and Fastly. Our world is more secure when our industry collaborates to tackle complex security challenges.

Additional Resources:

The post Protecting Against HTTP/2 Rapid Reset: CVE-2023-44487 appeared first on Blog.