CVE-2016-0736
HIGH EXPLOITED RANSOMWAREApache HTTP Server <2.4.24 - Info Disclosure
Title source: llmDescription
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
Exploits (1)
exploitdb
WORKING POC
by RedTeam Pentesting GmbH · pythonwebappsmultiple
https://www.exploit-db.com/exploits/40961
References (27)
... and 7 more
Scores
CVSS v3
7.5
EPSS
0.4168
EPSS Percentile
97.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-02-14
Ransomware Use
Confirmed
CWE
CWE-310
Status
published
Products (18)
apache/http_server
2.4.0
apache/http_server
2.4.1
apache/http_server
2.4.2
apache/http_server
2.4.3
apache/http_server
2.4.6
apache/http_server
2.4.7
apache/http_server
2.4.8
apache/http_server
2.4.9
apache/http_server
2.4.10
apache/http_server
2.4.12
... and 8 more
Published
Jul 27, 2017
Tracked Since
Feb 18, 2026