Unveiling the HTTP/2 CONTINUATION Flood: A New Cybersecurity Threat

In the dynamic world of cybersecurity, a new vulnerability within the HTTP/2 protocol has emerged, presenting a potent threat to web servers worldwide through Denial-of-Service (DoS) attacks. This article delves into the intricacies of the HTTP/2 CONTINUATION Flood, a technique capable of exploiting the CONTINUATION frame, uncovering a critical security oversight. Highlighting the findings of security researcher Bartek Nowotarski and the advisory from CERT Coordination Center (CERT/CC), we explore the implications of this vulnerability and the measures needed to combat it.

Unveiling the HTTP/2 CONTINUATION Flood: A New Cybersecurity Threat

Understanding HTTP/2 Vulnerability

Discovered by Bartek Nowotarski and reported to CERT/CC on January 25, 2024, the HTTP/2 CONTINUATION Flood vulnerability shines a light on a significant flaw in the protocol’s design. CERT/CC’s advisory on April 3, 2024, provided a detailed account of how attackers could exploit this vulnerability to initiate DoS attacks against unsuspecting web servers.

Key Vulnerability Insights

Exploitation Method: Attackers can send an overwhelming number of CONTINUATION frames within a single stream, leading to server memory issues or an outright Out of Memory (OOM) crash.

Protocol Mechanism: HTTP/2 enhances web performance through header fields in requests and responses, divided into header blocks and transmitted via HEADERS or CONTINUATION frames. The vulnerability lies in the mishandling of these CONTINUATION frames.

The Impact on Web Security

The revelation of the HTTP/2 CONTINUATION Flood vulnerability underscores a critical challenge in securing web servers against sophisticated cyber-attacks. It highlights the necessity for continuous scrutiny of protocols and the implementation of robust security measures to protect digital infrastructure.

Cybersecurity Measures

In response to the discovery of this vulnerability, web administrators and security professionals are advised to thoroughly assess their HTTP/2 implementations. Ensuring systems are updated and fortified against such exploits is paramount in safeguarding against potential DoS attacks.

Moving Forward: The Path to Enhanced Security

The emergence of the HTTP/2 CONTINUATION Flood vulnerability is a stark reminder of the evolving nature of cyber threats. As we navigate the complexities of internet security, the collaboration between researchers, cybersecurity experts, and web administrators will be crucial in developing strategies to mitigate these risks.

The issue impacts several projects such as amphp/http (CVE-2024-2653), Apache HTTP Server (CVE-2024-27316), Apache Tomcat (CVE-2024-24549), Apache Traffic Server (CVE-2024-31309), Envoy proxy (CVE-2024-27919 and CVE-2024-30255), Golang (CVE-2023-45288), h2 Rust crate, nghttp2 (CVE-2024-28182), Node.js (CVE-2024-27983), and Tempesta FW (CVE-2024-2758).


The discovery of the HTTP/2 CONTINUATION Flood highlights a pressing concern within the realm of cybersecurity. By understanding the vulnerability, its impact, and the measures required for protection, the digital community can better prepare against the ever-present threat of cyber-attacks. As technology advances, so too must our vigilance and commitment to cybersecurity. Thank you for reading the HuuPhan.com page!


Popular posts from this blog

zimbra some services are not running [Solve problem]

How to install php7 on centos 6

Bash script list all IP addresses connected to Server