Hi team,
The "CONTINUATION Flood" vulnerability has been recently disclosed on a webserver that supports HTTP/2.0. After conducting a swift verification, it appears that all the Apache server versions used by Check Point are affected by this vulnerability. However, upon verifying the multiportals on R81.10 at least, it was found that it does not support HTTP/2.0, ensuring our safety in this regard.
Since I do not have R81.20 can any one confirm? Or someone from CheckPoint staff can confirm?
This is from R81.10
/web/cpshared/web/Apache/2.2.0/bin/httpd2 -v
Server version: CPWS/2.4.55 (Unix)
Server built: Apr 4 2023 13:08:25
https://nowotarski.info/http2-continuation-flood/
https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-si...
Thanks and Regards,
Blason R
CCSA,CCSE,CCCS