CVE-2025-23048

Updated: 2025-08-20 03:18:44.356502

Description:

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU httpd 2.4.53 7.5 HIGH Released CLSA-2025:1757501175 2025-09-10 13:43:45
CentOS 8.4 ELS httpd 2.4.37 7.5 HIGH Released CLSA-2025:1758914697 2025-09-26 23:51:09
CentOS 8.5 ELS httpd 2.4.37 7.5 HIGH Released CLSA-2025:1758915354 2025-09-26 23:51:08
CentOS Stream 8 ELS httpd 2.4.37 7.5 HIGH Released CLSA-2025:1758914381 2025-09-26 23:51:10
Ubuntu 16.04 ELS apache2 2.4.18 7.5 HIGH Released CLSA-2025:1757428404 2025-09-09 15:34:35
Ubuntu 18.04 ELS apache2 2.4.29 7.5 HIGH Released CLSA-2025:1756830276 2025-09-02 22:39:24