In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00013}


Thu, 10 Jul 2025 17:00:00 +0000

Type Values Removed Values Added
Description In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
Title Apache HTTP Server: mod_ssl access control bypass with session resumption
Weaknesses CWE-284
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-07-10T16:56:53.545Z

Updated: 2025-07-10T16:56:53.545Z

Reserved: 2025-01-10T15:11:45.480Z

Link: CVE-2025-23048

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-07-10T17:15:46.553

Modified: 2025-07-10T17:15:46.553

Link: CVE-2025-23048

cve-icon Redhat

No data.