Skip to main content
NewsStrategic Insights

Cybersecurity Alert: Addressing the HTTP/2 CONTINUATION Vulnerability

HTTP/2 protocol flaw enables attackers to exploit the CONTINUATION feature, causing denial-of-service (DoS) attacks that can bring down servers with just a single connection.

Cybersecurity Alert: Addressing the HTTP/2 CONTINUATION Vulnerability

HTTP/2 protocol flaw enables attackers to exploit the CONTINUATION feature, causing denial-of-service (DoS) attacks that can bring down servers with just a single connection.

Radware DDoS Protection Services offer you a solution:
According to Radware’s findings, the HTTP/2 CONTINUATION attack can be effectively mitigated using DefensePro with a Layer 7 Cookie Challenge. This defense mechanism prevents attackers from bypassing security measures, as DefensePro seamlessly switches to HTTP/1, where such attacks cannot be executed.

Radware Cloud Services have signatures for detecting HTTP/2 connections from continuously sending large header information without an end, and offer an additional layer of defense against potential attacks.

Caution is advised when implementing END_HEADERS bit monitoring on web servers themselves, while establishing a connection as there may be instances of false positives, necessitating further clarification on the configuration process for this step.

Expert Assistance: Consider reaching out to Kaloyan Kolev professional profile on our website https://lnkd.in/dpVRgZc6 for expert guidance on addressing cybersecurity vulnerabilities.