In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html |
![]() ![]() |
History
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Thu, 10 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade. | |
Title | Apache HTTP Server: mod_ssl TLS upgrade attack | |
Weaknesses | CWE-287 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-07-10T16:58:23.943Z
Updated: 2025-07-10T16:58:23.943Z
Reserved: 2025-06-11T09:36:54.723Z
Link: CVE-2025-49812

No data.

Status : Received
Published: 2025-07-10T17:15:48.193
Modified: 2025-07-10T17:15:48.193
Link: CVE-2025-49812

No data.