A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker.
Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://httpd.apache.org/security/vulnerabilities_24.html |
|
History
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache apache Http Server |
|
| Vendors & Products |
Apache
Apache apache Http Server |
Mon, 04 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker. Users are recommended to upgrade to version 2.4.67, which fixes this issue. | |
| Title | Apache HTTP Server: mod_auth_digest timing attack | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-04T17:32:47.129Z
Reserved: 2026-03-17T16:42:48.946Z
Link: CVE-2026-33006
No data.
Status : Undergoing Analysis
Published: 2026-05-04T15:16:03.977
Modified: 2026-05-04T15:21:58.203
Link: CVE-2026-33006
No data.
OpenCVE Enrichment
Updated: 2026-05-04T17:00:04Z
Weaknesses