CVE-2016-0736

HIGH EXPLOITED RANSOMWARE

Apache HTTP Server <2.4.24 - Info Disclosure

Title source: llm

Description

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.

Exploits (1)

exploitdb WORKING POC
by RedTeam Pentesting GmbH · pythonwebappsmultiple
https://www.exploit-db.com/exploits/40961

References (27)

... and 7 more

Scores

CVSS v3 7.5
EPSS 0.4168
EPSS Percentile 97.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-02-14
Ransomware Use Confirmed
CWE
CWE-310
Status published
Products (18)
apache/http_server 2.4.0
apache/http_server 2.4.1
apache/http_server 2.4.2
apache/http_server 2.4.3
apache/http_server 2.4.6
apache/http_server 2.4.7
apache/http_server 2.4.8
apache/http_server 2.4.9
apache/http_server 2.4.10
apache/http_server 2.4.12
... and 8 more
Published Jul 27, 2017
Tracked Since Feb 18, 2026