Description
A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration.

Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Published: 2026-05-04
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A NULL pointer dereference in the mod_authn_socache component of Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to cause a child process to crash when the server is configured as a caching forward proxy. This flaw does not provide code execution, but it can be used to interrupt service by repeatedly triggering child process failures, leading to widespread denial of service. The weakness is a classic null pointer dereference (CWE‑476).

Affected Systems

The impact applies to the Apache Software Foundation’s Apache HTTP Server product. All releases up to and including version 2.4.66 are affected. Users are advised to upgrade to version 2.4.67, which contains the fix.

Risk and Exploitability

The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, indicating no known exploitation in the wild to date. However, the flaw can be triggered by any unauthenticated remote user via standard HTTP traffic to a proxy instance that uses mod_authn_socache, making the risk moderate to high for exposed servers, as reflected by a CVSS score of 5.3. The lack of public exploitation does not reduce the severity of the impact, as service disruption can have significant operational consequences. The advisement is to treat it as a significant risk that merits prompt remediation.

Generated by OpenCVE AI on May 4, 2026 at 17:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache HTTP Server to version 2.4.67 or later, which includes the patch for the null pointer bug.
  • If an immediate upgrade cannot be performed, disable the mod_authn_socache module or configure the server not to use caching forward proxy functionality, thereby eliminating the attack surface.
  • Implement network access controls to limit interaction with the proxy functionality to trusted IP ranges, and monitor server logs for repeated child process crashes to detect attempted exploitation.

Generated by OpenCVE AI on May 4, 2026 at 17:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Mon, 04 May 2026 18:30:00 +0000

Type Values Removed Values Added
References

Mon, 04 May 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache http Server
Vendors & Products Apache
Apache http Server

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 15:00:00 +0000

Type Values Removed Values Added
Description A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration. Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Title Apache HTTP Server: mod_authn_socache crash
Weaknesses CWE-476
References

Subscriptions

Apache Http Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-04T17:32:48.215Z

Reserved: 2026-03-17T16:46:05.025Z

Link: CVE-2026-33007

cve-icon Vulnrichment

Updated: 2026-05-04T17:32:48.215Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-04T15:16:04.107

Modified: 2026-05-04T20:22:13.073

Link: CVE-2026-33007

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T18:00:05Z

Weaknesses