CVE-2025-23419

MEDIUM

F5 Nginx < 1.26.3 - Incorrect Authorization

Title source: rule

Description

When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key are used and/or the SSL session cache https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_cache are used in the default server and the default server is performing client certificate authentication.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Exploits (2)

nomisec WORKING POC
by xitexploiter96-dot · poc
https://github.com/xitexploiter96-dot/CVE-2025-23419
nomisec SCANNER
by harley-ghostie · poc
https://github.com/harley-ghostie/safe-check-CVE-2025-23419

Scores

CVSS v3 4.3
EPSS 0.0286
EPSS Percentile 86.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Details

CWE
CWE-863
Status published
Products (5)
debian/debian_linux 11.0
f5/nginx 1.11.4 - 1.26.3
f5/nginx_plus r32 (2 CPE variants)
f5/nginx_plus r33 (2 CPE variants)
f5/nginx_plus r28 - r32
Published Feb 05, 2025
Tracked Since Feb 18, 2026