CVE-2025-23048

Public on 2025-07-10
Modified on 2025-07-14
Description
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
Severity
Important severity
Important
See what this means
CVSS v3 Base Score
7.6
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 httpd No Fix Planned
Amazon Linux 2 - Core httpd Pending Fix
Amazon Linux 2023 httpd Pending Fix
Amazon Linux 1 httpd24 No Fix Planned

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
NVD CVSSv3 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N