HTTP/2 Continuation Flood Attack: One Machine, Server Down

1 min read


  • Security researcher Bartek Nowotarski disclosed a new class of vulnerabilities within the HTTP/2 protocol known as the HTTP/2 Continuation Flood.
  • The attack exploits the CONTINUATION frames of HTTP/2, allowing a single machine to cause significant disruptions to server operations.

In a recent article on Cyber Security News, it was revealed that security researcher Bartek Nowotarski has uncovered a new vulnerability within the HTTP/2 protocol known as the HTTP/2 Continuation Flood attack. This attack vector allows a single machine, and sometimes just a few frames or a TCP connection, to wreak havoc on server operations by sending an infinite stream of headers that consume memory resources indefinitely. Unlike traditional attacks that leave a trace in HTTP access logs, the Continuation Flood attack is stealthy and can go undetected by server administrators. This vulnerability has raised concerns within the cybersecurity community about the security of websites and online services relying on HTTP/2. It emphasizes the need for server administrators and software developers to review their HTTP/2 implementations and apply necessary patches or updates to protect against such attacks. Additionally, there is a call for enhanced monitoring tools to detect these stealthy attacks in real-time and alert administrators. The HTTP/2 Continuation Flood attack serves as a reminder of the constant vigilance required to protect online infrastructure and stay ahead of emerging cybersecurity threats.

Previous Story

Review proposed incentives, penalties, and compliance standards for HHS cybersecurity goals

Next Story

Multiple China hacker groups exploit Ivanti security flaws, say researchers

Latest from News