We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-23048

Apache HTTP Server: mod_ssl access control bypass with session resumption



Description

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

Reserved 2025-01-10 | Published 2025-07-10 | Updated 2025-07-10 | Assigner apache

Problem types

CWE-284 Improper Access Control

Product status

Default status
unaffected

2.4.35
affected

Timeline

2024-11-25:reported

Credits

Sven Hebrok, Felix Cramer, Tim Storm, Maximilian Radoy, and Juraj Somorovsky at Paderborn University finder

References

httpd.apache.org/security/vulnerabilities_24.html vendor-advisory

cve.org (CVE-2025-23048)

nvd.nist.gov (CVE-2025-23048)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-23048

Support options

Helpdesk Chat, Email, Knowledgebase