Search for vulnerabilities
Vulnerability ID | VCID-auc4-5bkq-8ffa |
Aliases |
CVE-2016-0736
|
Summary | Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. An authentication tag (SipHash MAC) is now added to prevent such attacks. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 4.9 |
Risk | 9.8 |
Affected and Fixed Packages | Package Details |
CWE-287 | Improper Authentication |
Data source | Exploit-DB |
---|---|
Date added | Dec. 23, 2016 |
Description | Apache mod_session_crypto - Padding Oracle |
Ransomware campaign use | Unknown |
Source publication date | Dec. 23, 2016 |
Exploit type | webapps |
Platform | multiple |
Source update date | Dec. 23, 2016 |
Source URL | https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.92886 |
EPSS Score | 0.10249 |
Published At | Aug. 1, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:29:00.984848+00:00 | Apache HTTPD Importer | Import | https://httpd.apache.org/security/json/CVE-2016-0736.json | 37.0.0 |