Malicious HTTP/2 Requests on IIS Server Cause The System CPU Usage to Spike to 100%

Microsoft Security advisory released a new flaw in IIS server that Microsoft
 the system CPU usage to spike to 100% when malicious HTTP/2 requests are sent to a Windows Server.

This malicious process will remain continually affected the CPU usage until the Malicious connection killed by the IIS server.

IIS is a web server created by Microsoft that supports HTTP, HTTP/2, HTTPS, FTP, FTPS, SMTP and NNTP.

This potential vulnerability affected with both IIS software versions Windows 10 and Windows Server 2016.

HTTP/2 is a revised version of HTTP network protocol used by the World Wide Web and HTTP/2 is the first new version of HTTP since HTTP 1.1.

In this case, Microsoft said ” The HTTP/2 specification allows clients to specify any number of SETTINGS frames with any number of SETTINGS parameters. In some situations, excessive settings can cause services to become unstable and may result in a temporary CPU usage spike until the connection timeout is reached and the connection is closed. “

Microsoft released the security updates for this flaw under the impact of “Defense in Depth

Microsoft didn’t revealed any technical information about this bug and Microsoft added the ability to define a threshold on the number of HTTP/2 SETTINGS included in a request.

So once the update will be taking effect, IIS administrators will be able to customize HTTP/2 SETTINGS in order to prevent it from the malicious request and avoid the rising of CPU spike to 100%.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Around 8 million websites affected by a critical Buffer Overflow Vulnerability resides in IIS 6.0

Most Important Web Server Penetration Testing Checklist

Rising Threats in CyberSpace – Organizations Must be Prepared to Experience


Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

1 day ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

1 day ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

1 day ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

2 days ago

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits…

2 days ago

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and…

2 days ago