Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23048: CWE-284 Improper Access Control in Apache Software Foundation Apache HTTP Server

0
Critical
VulnerabilityCVE-2025-23048cvecve-2025-23048cwe-284
Published: Thu Jul 10 2025 (07/10/2025, 16:56:53 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache HTTP Server

Description

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:05:38 UTC

Technical Analysis

CVE-2025-23048 is a critical vulnerability classified under CWE-284 (Improper Access Control) affecting Apache HTTP Server versions 2.4.35 through 2.4.63. The issue arises in mod_ssl configurations where multiple virtual hosts are set up, each restricted to different sets of trusted client certificates, typically enforced via SSLCACertificateFile or SSLCACertificatePath directives. When TLS 1.3 session resumption is used, a client authenticated and trusted on one virtual host can bypass access controls and gain unauthorized access to another virtual host if SSLStrictSNIVHostCheck is not enabled on either host. This occurs because the server does not properly enforce strict Server Name Indication (SNI) checks during session resumption, allowing the client to reuse a session associated with one virtual host to access another. The vulnerability does not require any privileges or user interaction and can be exploited remotely over the network. The impact includes unauthorized disclosure and modification of data on virtual hosts that should be restricted, compromising confidentiality and integrity. Although no known exploits are currently in the wild, the high CVSS score of 9.1 indicates a critical risk. The vulnerability affects configurations common in environments where client certificate authentication is used to segregate access across multiple virtual hosts on the same Apache server instance.

Potential Impact

For European organizations, this vulnerability poses a significant risk to multi-tenant web services, government portals, financial institutions, and enterprises that rely on Apache HTTP Server with mod_ssl configured for client certificate-based access control across multiple virtual hosts. Unauthorized access could lead to data breaches, exposure of sensitive information, and potential lateral movement within networks. The confidentiality and integrity of data hosted on affected virtual hosts are at risk, potentially violating GDPR and other data protection regulations. Organizations with complex hosting environments or those providing services to multiple clients on shared infrastructure are particularly vulnerable. The ease of remote exploitation without authentication increases the threat level, potentially enabling attackers to bypass intended access restrictions and compromise sensitive resources.

Mitigation Recommendations

To mitigate this vulnerability, administrators should immediately enable the SSLStrictSNIVHostCheck directive on all virtual hosts configured with mod_ssl and client certificate restrictions. This setting enforces strict SNI checks during TLS session resumption, preventing session reuse across virtual hosts. Additionally, organizations should plan to upgrade Apache HTTP Server to versions beyond 2.4.63 once official patches are released. In the interim, reviewing and auditing mod_ssl configurations for multiple virtual hosts with distinct client certificate requirements is critical. Network segmentation and monitoring TLS session resumption behaviors can provide additional detection capabilities. Implementing strict logging and alerting for anomalous access patterns related to TLS sessions may help identify exploitation attempts. Finally, educating system administrators about this vulnerability and ensuring timely patch management processes are essential to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-01-10T15:11:45.480Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686ff1d3a83201eaaca8def8

Added to database: 7/10/2025, 5:01:07 PM

Last enriched: 1/22/2026, 8:05:38 PM

Last updated: 2/7/2026, 10:05:59 AM

Views: 230

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats