Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical, High-Severity Vulnerabilities Patched in Apache MINA, HTTP Server

The most severe of these security defects could allow remote attackers to execute arbitrary code.

Apache vulnerability

Apache on Monday released patches for over a dozen vulnerabilities in HTTP Server and MINA, including critical and high-severity issues that could be exploited for remote code execution (RCE).

Apache HTTP Server 2.4.67 was released with fixes for 11 vulnerabilities, 10 of which affect all previous releases.

The first is CVE-2026-23918, a double-free and possible RCE bug in the HTTP/2 protocol handling. By triggering an early reset, an attacker could cause a denial-of-service (DoS) condition and potentially execute arbitrary code.

Next in line is CVE-2026-28780, a heap buffer overflow issue that could allow remote attackers to send crafted AJP messages to cause a DoS condition and execute code.

Three other security defects, CVE-2026-29168, CVE-2026-29169, and CVE-2026-33007, could lead to DoS conditions, while four, namely CVE-2026-24072, CVE-2026-33857, CVE-2026-34032, and CVE-2026-34059, could lead to information disclosure.

The update also addresses an improper neutralization of CRLF sequences issue, tracked as CVE-2026-33523, which allows attackers to manipulate HTTP responses, and a timing side-channel weakness (CVE-2026-33006) that could lead to Digest authentication bypass.

Advertisement. Scroll to continue reading.

On Monday, Apache announced the rollout of MINA 2.2.7 and MINA 2.1.12 with fixes for two critical-severity vulnerabilities that should have been addressed in previous releases.

The first, CVE-2026-42778, is described as an incomplete fix for CVE-2026-41409, which in turn is an incomplete fix for CVE-2024-52046, an insecure deserialization of data that could be exploited for RCE.

The second is CVE-2026-42779, an incomplete fix for CVE-2026-41635, an improper check flaw leading to allowlist bypass and code execution.

Following the upgrade to a patched release, Apache says, organizations need to “explicitly allow the classes the decoder will accept in the ObjectSerializationDecoder instance”.

Related: SonicWall Urges Immediate Patching of Firewall Vulnerabilities

Related: No Patch for New PhantomRPC Privilege Escalation Technique in Windows

Related: Incomplete Windows Patch Opens Door to Zero-Click Attacks

Related: Vulnerabilities Patched in CrowdStrike, Tenable Products

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Jacki Monson has joined CVS Health as SVP, Deputy CISO.

Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.