
[CIVN-2026-0221] Multiple Vulnerabilities in Apache HTTP Server
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Apache HTTP Server
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Apache HTTP Server versions prior to 2.4.67
Overview
Multiple vulnerabilities have been reported in Apache HTTP Server which could be exploited by an attacker to execute arbitrary code, bypass security restrictions, disclose sensitive information, escalate privileges, or cause denial of service (DoS) condition on the targeted system.
Target Audience:
System administrators, DevOps teams and organizations managing Apache HTTP Server.
Risk Assessment:
High risk of unauthorized access to sensitive data, bypass of security controls, possible remote code execution, privilege escalation, or disruption of services.
Impact Assessment:
Potential for arbitrary code execution, sensitive information disclosure, privilege escalation, system compromise, or service disruption.
Description
Apache HTTP Server is an open-source web server platform widely used for hosting web applications and websites, known for its reliability, performance, and cross-platform support.
Multiple vulnerabilities exist in Apache HTTP Server due to improper memory handling, insufficient access control, improper validation of HTTP/AJP responses, unrestricted resource allocation, and timing-based authentication weakness in various components.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, bypass security restrictions, disclose sensitive information, escalate privileges, or cause denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://httpd.apache.org/security/vulnerabilities_24.html
Vendor Information
Apache HTTP Server
https://httpd.apache.org/security/vulnerabilities_24.html
References
Apache HTTP Server
https://httpd.apache.org/security/vulnerabilities_24.html
CVE Name
CVE-2026-23918
CVE-2026-24072
CVE-2026-28780
CVE-2026-29168
CVE-2026-29169
CVE-2026-33006
CVE-2026-33007
CVE-2026-33523
CVE-2026-33857
CVE-2026-34032
CVE-2026-34059
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn8pRMACgkQ3jCgcSdc
ys/uUg//fpetrJFqXCODzuxh+1AGV3f9bg5S+TY2ZO9WlRuheE38QW4Sg5ZEBz+t
tRmSAF4fGAmxIFT4einsRlNO93dBqIaXqQEf6GJGXNfDZ/YLA5m7+GTIYpgev8sv
zwzx9+CSERomFpHaBJ8PfYDgSvfcvvr58M6x4FQpRRmTzvubMkzZydMdJZpMz0/F
+cCLNFmov/wUui+//s2PU6IZE3ldE8tr22aDmHABypFhjpmFzq2O6Spy5CRV1NLL
QTxcmCqfWs6RS+jZpWCSpwRWpUnqgd5DXTxNxfIDpm992PICKV1Q+WfZ2mf20LY8
39C2/jKwVMZOr4WTh00xV0KNxTsQHse5599OOQPqGpOfV6Rsc+xM7Vmg9bq09qE/
VKlY3UUM/KB9bX/X5RSmH5Gy1IaSncGeM1u6FW1zS4X4i9zPaZyNo50KUUnBnvv5
MvdbL7XR9WW5RfzAIC+wFZ48SsUkZCKRfZKeJJS16byKtfJQK39N2sGYDffH+Ney
kCm2/MTml7cM8YGipzegEuS1tlUm5iCYAil305lvR0HXzo/V8mGm7eKVsENAZFp5
H4tUUgbAbaDCNQiiWLRiOFkx3IU4578NvT1c5+esg68yqRbCr3GFptT1hmqpv59I
FvurE4YuobFjNfLFSUlkzQHzLasIsML5Ne+Ra52rWR4jo7dFq+4=
=jV7i
—–END PGP SIGNATURE—–


