HTTP/2 (H2) vulnerabilities CVE-2023-44487, “rapid reset” and CVE-2025-8671 "MadeYouReset" attacks permit a denial of service scenario where a high volume of coordinated HTTP/2 request cancellations can quickly reset many HTTP/2 streams, exhausting server resources and potentially causing outages.
Resolution
Edge SWG (ProxySG or ASG)
Versions
Applicability
Version prior to 7.x
Not vulnerable. HTTP/2 is not natively supported
7.1x through 7.3.14.x
Vulnerable excluding the specific patches listed below
7.3.13.5 and later 7.3.13.x
Not vulnerable
7.3.14.4 and later 7.3.14.x
Not vulnerable
7.3.15.x and later 7.3.x
Not vulnerable
7.4.1.1
Vulnerable
7.4.1.2
Not vulnerable
7.4.2.x and later
Not vulnerable
Cloud SWG
Cloud SWG (formerly WSS) does provide the same CPL to disable HTTP/2 for UPE managed tenants and also limits the concurrent streams.
Additional Information
For vulnerable versions, the attack can be prevented by disabling HTTP/2 via policy using CPL: