CVE-2018-1312
high-risk
Published 2018-03-26
In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
Do I need to act?
~
7.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
References (58)
Third Party Advisory
http://www.securityfocus.com/bid/103524
Broken Link
http://www.securitytracker.com/id/1040571
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3558
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0366
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0367
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1898
Vendor Advisory
https://httpd.apache.org/security/vulnerabilities_24.html
and 38 more references
66
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
10/34 · Low
Exposure
24/34 · High