vulnerability
Apache HTTPD: Apache HTTP Server: mod_ssl TLS upgrade attack (CVE-2025-49812)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:N) | Jul 10, 2025 | Jul 18, 2025 | Nov 6, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:N)
Published
Jul 10, 2025
Added
Jul 18, 2025
Modified
Nov 6, 2025
Description
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
Solution
apache-httpd-upgrade-latest
References
- URL-http://www.openwall.com/lists/oss-security/2025/07/09/3
- URL-http://www.openwall.com/lists/oss-security/2025/07/10/2
- URL-http://www.openwall.com/lists/oss-security/2025/07/10/9
- URL-https://httpd.apache.org/security/vulnerabilities_24.html
- URL-https://lists.debian.org/debian-lts-announce/2025/08/msg00009.html
- CVE-2025-49812
- https://attackerkb.com/topics/CVE-2025-49812
- CWE-287
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.