CVE-2023-6596

7.5 HIGH

📋 TL;DR

CVE-2023-6596 is an incomplete fix for the Rapid Reset vulnerability (CVE-2023-44487/CVE-2023-39325) in OpenShift Container Platform. This allows attackers to perform HTTP/2 Rapid Reset attacks, potentially causing denial of service by overwhelming servers with request cancellations. Organizations running affected OpenShift versions are vulnerable.

💻 Affected Systems

Products:
  • OpenShift Container Platform
Versions: OpenShift Container Platform 4.12, 4.13, 4.14 before specific patch releases
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects OpenShift clusters with HTTP/2 enabled (default). The vulnerability stems from incomplete fixes for CVE-2023-44487 and CVE-2023-39325.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through resource exhaustion, making OpenShift clusters unavailable for extended periods.

🟠

Likely Case

Degraded performance or intermittent service outages affecting application availability.

🟢

If Mitigated

Minimal impact with proper rate limiting, network controls, and updated infrastructure.

🌐 Internet-Facing: HIGH - Internet-facing OpenShift clusters are directly exposed to potential DDoS attacks.
🏢 Internal Only: MEDIUM - Internal clusters could still be targeted by compromised internal systems or attackers who breach network perimeters.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

HTTP/2 Rapid Reset attacks are well-documented and tooling exists. This specific CVE represents an incomplete patch, making exploitation straightforward for attackers familiar with the original vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenShift Container Platform 4.12.56, 4.13.49, 4.14.24 and later

Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:0485

Restart Required: Yes

Instructions:

1. Check current OpenShift version: oc version
2. Update cluster using OpenShift's update mechanism: oc adm upgrade
3. Apply relevant errata: yum update openshift-hyperkube openshift-clients
4. Restart affected components as indicated in Red Hat advisories

🔧 Temporary Workarounds

HTTP/2 Disablement

linux

Disable HTTP/2 protocol on ingress controllers to prevent Rapid Reset attacks

oc patch ingresscontroller/default -n openshift-ingress-operator --type=merge -p '{"spec":{"httpProtocol":"HTTP1"}}'

Rate Limiting Configuration

linux

Implement request rate limiting on ingress controllers to mitigate DDoS impact

oc edit ingresscontroller/default -n openshift-ingress-operator
Add rate limiting annotations in spec

🧯 If You Can't Patch

  • Implement network-level rate limiting and DDoS protection (e.g., using cloud WAF, load balancer features, or firewall rules)
  • Monitor for abnormal HTTP/2 traffic patterns and implement alerting for rapid connection resets

🔍 How to Verify

Check if Vulnerable:

Check OpenShift version: oc version | grep 'Server Version' and compare to affected versions (4.12.x < 4.12.56, 4.13.x < 4.13.49, 4.14.x < 4.14.24)

Check Version:

oc version | grep 'Server Version'

Verify Fix Applied:

Verify version is patched: oc version | grep 'Server Version' should show 4.12.56+, 4.13.49+, or 4.14.24+

📡 Detection & Monitoring

Log Indicators:

  • High frequency of HTTP/2 RST_STREAM frames in ingress controller logs
  • Unusual spike in 502/503 errors from applications

Network Indicators:

  • Abnormal HTTP/2 traffic patterns with rapid connection establishment/reset cycles
  • High volume of small HTTP/2 requests with immediate cancellation

SIEM Query:

source="openshift-ingress" AND ("RST_STREAM" OR "stream_canceled") | stats count by host

🔗 References

📤 Share & Export