VYPR
High severity7.5NVD Advisory· Published Jul 27, 2017· Updated May 13, 2026

CVE-2016-0736

CVE-2016-0736

Description

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache HTTP Server mod_session_crypto uses CBC/ECB modes without authenticated encryption, enabling padding oracle attacks on session cookies.

Vulnerability

In Apache HTTP Server versions 2.4.0 through 2.4.23, the mod_session_crypto module encrypts session data and cookies using the configured ciphers with either CBC or ECB modes of operation (AES256-CBC by default). No selectable or built-in authenticated encryption is provided, making the implementation vulnerable to padding oracle attacks [1][2].

Exploitation

An attacker with network access to observe encrypted session cookies can perform a padding oracle attack by sending modified ciphertexts to the server and observing the server's response (e.g., error messages or timing differences). This allows the attacker to decrypt the session data byte by byte without knowing the encryption key [2].

Impact

Successful exploitation leads to disclosure of the plaintext session data, which may contain sensitive information such as authentication tokens or user attributes. The attacker can then potentially forge valid session cookies, leading to session hijacking and unauthorized access [1][2].

Mitigation

Upgrade to Apache HTTP Server 2.4.26 or later, which includes a fix that adds authenticated encryption support [2]. Red Hat Enterprise Linux users can apply the updated httpd packages provided in RHSA-2017:0906 and RHSA-2017:1161 [1][4]. Apple macOS users received the fix in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan [3].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

8

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

27

News mentions

0

No linked articles in our index yet.