CVE-2016-0736

high-risk
Published 2017-07-27

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.

Do I need to act?

!
41.7% chance of exploitation in next 30 days
EPSS score — higher than 58% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10 High
NETWORK / LOW complexity

Affected Vendors

62
/ 100
high-risk
Severity 26/34 · High
Exploitability 17/34 · Moderate
Exposure 19/34 · Moderate