Updated: 2025-08-20 03:18:44.356502
Description:
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | NONE | 0.0 |
| CVSS Version 3.x | HIGH | 7.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | httpd | 2.4.53 | 7.5 | HIGH | Released | CLSA-2025:1757501175 | 2025-09-10 13:43:45 | |
| CentOS 8.4 ELS | httpd | 2.4.37 | 7.5 | HIGH | Released | CLSA-2025:1758914697 | 2025-09-26 23:51:09 | |
| CentOS 8.5 ELS | httpd | 2.4.37 | 7.5 | HIGH | Released | CLSA-2025:1758915354 | 2025-09-26 23:51:08 | |
| CentOS Stream 8 ELS | httpd | 2.4.37 | 7.5 | HIGH | Released | CLSA-2025:1758914381 | 2025-09-26 23:51:10 | |
| Ubuntu 16.04 ELS | apache2 | 2.4.18 | 7.5 | HIGH | Released | CLSA-2025:1757428404 | 2025-09-09 15:34:35 | |
| Ubuntu 18.04 ELS | apache2 | 2.4.29 | 7.5 | HIGH | Released | CLSA-2025:1756830276 | 2025-09-02 22:39:24 |