CVE-2025-23048
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-11-04

Assigner: Apache Software Foundation

Description
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache http_server From 2.4.35 (inc) to 2.4.64 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in certain mod_ssl configurations on Apache HTTP Server versions 2.4.35 through 2.4.63. It allows an access control bypass by trusted clients when using TLS 1.3 session resumption. Specifically, if mod_ssl is configured with multiple virtual hosts each restricted to different trusted client certificates, a client trusted for one virtual host may gain access to another virtual host if the SSLStrictSNIVHostCheck setting is not enabled.


How can this vulnerability impact me? :

The vulnerability can allow a client that is trusted to access one virtual host to bypass access controls and gain unauthorized access to other virtual hosts on the same server. This could lead to unauthorized data access or actions on virtual hosts that should be restricted.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that the Apache HTTP Server's mod_ssl configuration enables SSLStrictSNIVHostCheck for all virtual hosts that use different trusted client certificates. This setting prevents access control bypass by enforcing strict Server Name Indication (SNI) checks during TLS 1.3 session resumption. Review your mod_ssl configurations for multiple virtual hosts with different SSLCACertificateFile or SSLCACertificatePath settings and enable SSLStrictSNIVHostCheck to block unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart