Impact
A double free in the HTTP/2 implementation of Apache HTTP Server can be triggered during an early reset, potentially allowing an attacker to execute arbitrary code on the server. The flaw falls under CWE‑415 and can compromise confidentiality, integrity, and availability if exploited.
Affected Systems
The vulnerability affects Apache HTTP Server version 2.4.66, as delivered by the Apache Software Foundation. Upgrade to version 2.4.67 removes the issue.
Risk and Exploitability
With a CVSS score of 8.8, the vulnerability is high severity. While the EPSS score is not available and the flaw is not listed in the CISA KEV catalog, the remote code execution potential and the lack of mitigation in the affected release suggest a high likelihood that malicious actors may exploit the weakness. The absence of public exploitation data does not reduce the risk, as similar double‑free conditions have historically led to successful attacks.
OpenCVE Enrichment