The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-43622

CVE-2023-43622: Apache HTTP Server DoS Vulnerability

CVE-2023-43622 is a denial of service vulnerability in Apache HTTP Server that allows attackers to exhaust worker resources using HTTP/2 connections. This article covers the technical details, affected versions, and mitigation.

Published: February 11, 2026

CVE-2023-43622 Overview

CVE-2023-43622 is a denial of service vulnerability in Apache HTTP Server that allows an attacker to exhaust server worker resources by exploiting the HTTP/2 protocol's initial window size handling. By opening an HTTP/2 connection with an initial window size of 0, an attacker can cause the server to block handling of that connection indefinitely. This attack pattern is similar to the well-known "slow loris" attack and can effectively render affected Apache HTTP Server instances unavailable.

Critical Impact

Remote attackers can exhaust worker resources in Apache HTTP Server instances by opening malicious HTTP/2 connections with zero window size, causing denial of service conditions without authentication.

Affected Products

  • Apache HTTP Server versions 2.4.55 through 2.4.57
  • Systems running HTTP/2 protocol on affected Apache versions
  • Web services and applications hosted on vulnerable Apache HTTP Server deployments

Discovery Timeline

  • 2023-10-23 - CVE-2023-43622 published to NVD
  • 2025-02-13 - Last updated in NVD database

Technical Details for CVE-2023-43622

Vulnerability Analysis

This vulnerability (CWE-400: Uncontrolled Resource Consumption) exists in the HTTP/2 implementation within Apache HTTP Server. The HTTP/2 protocol uses flow control mechanisms including window sizes to manage data transmission between client and server. When a client initiates an HTTP/2 connection with an initial window size set to 0, the server's connection handler enters a blocking state while waiting for the window to open, effectively holding the connection indefinitely.

The vulnerability allows unauthenticated remote attackers to consume server resources without requiring any special privileges or user interaction. The attack can be executed over the network, making it particularly dangerous for internet-facing Apache HTTP Server deployments.

Root Cause

The root cause lies in improper handling of HTTP/2 connections where the initial flow control window size is set to 0. The server's connection handling logic failed to properly enforce timeouts for such connections, allowing them to persist indefinitely and consume worker threads. This represents a resource exhaustion issue where the server does not adequately protect against malicious connection configurations.

Attack Vector

The attack exploits the HTTP/2 flow control mechanism by establishing connections with a zero initial window size. An attacker can open multiple such connections to exhaust the server's worker pool, preventing legitimate requests from being processed. This attack is network-accessible and does not require authentication, making it accessible to any remote attacker who can reach the HTTP/2 endpoint.

The attack pattern mirrors the classic "slow loris" technique but leverages HTTP/2-specific flow control rather than incomplete HTTP/1.x requests. Each malicious connection ties up a worker resource indefinitely, and with sufficient connections, all available workers can be exhausted.

Detection Methods for CVE-2023-43622

Indicators of Compromise

  • Unusual number of HTTP/2 connections with zero or minimal data transfer
  • Server worker threads blocked on HTTP/2 connection handling
  • Increased connection counts without corresponding request completion
  • Server logs showing HTTP/2 connections timing out or failing to progress

Detection Strategies

  • Monitor HTTP/2 connection states for connections stuck in flow control blocked state
  • Alert on abnormally high numbers of concurrent HTTP/2 connections from single sources
  • Track worker thread utilization and correlate with HTTP/2 connection patterns
  • Implement network-level monitoring for HTTP/2 SETTINGS frames with zero window sizes

Monitoring Recommendations

  • Deploy web application firewalls capable of inspecting HTTP/2 traffic characteristics
  • Configure server monitoring to alert when worker thread pools approach exhaustion
  • Enable detailed HTTP/2 connection logging to identify suspicious connection patterns
  • Monitor server resource utilization for signs of worker thread starvation

How to Mitigate CVE-2023-43622

Immediate Actions Required

  • Upgrade Apache HTTP Server to version 2.4.58 or later immediately
  • Review and reduce the Timeout directive to limit connection blocking duration
  • Consider temporarily disabling HTTP/2 protocol if upgrade is not immediately possible
  • Implement rate limiting on incoming HTTP/2 connections at the network perimeter

Patch Information

Apache has released version 2.4.58 which properly terminates connections with zero initial window size after the configured connection timeout expires. Users should upgrade to this version to fully remediate the vulnerability. See the Apache HTTP Server Security Vulnerabilities page for official patch information and download links. Additional vendor guidance is available in the NetApp Security Advisory NTAP-20231027-0011.

Workarounds

  • Reduce the Timeout directive value to minimize the duration connections can block
  • Implement connection limits per IP address using mod_reqtimeout or network firewalls
  • Deploy a reverse proxy or load balancer with HTTP/2 connection validation capabilities
  • If HTTP/2 is not required, disable it by removing Protocols h2 h2c from configuration
bash
# Configuration example - Mitigate by adjusting timeout and disabling HTTP/2
# In httpd.conf or relevant virtual host configuration

# Option 1: Reduce connection timeout
Timeout 30

# Option 2: Disable HTTP/2 if not required
# Remove or comment out the following line:
# Protocols h2 h2c http/1.1

# Option 3: Configure mod_reqtimeout for connection limits
<IfModule reqtimeout_module>
    RequestReadTimeout header=20-40,minrate=500
    RequestReadTimeout body=10-30,minrate=500
</IfModule>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechApache

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability59.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-400
  • Technical References
  • NetApp Security Advisory NTAP-20231027-0011
  • Vendor Resources
  • Apache HTTP Server Vulnerabilities
  • Related CVEs
  • CVE-2022-28615: Apache HTTP Server DOS Vulnerability

  • CVE-2025-55753: Apache HTTP Server DoS Vulnerability

  • CVE-2024-36387: Apache HTTP Server DoS Vulnerability

  • CVE-2025-49630: Apache HTTP Server DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English