Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache http Server
|
|
| CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache http Server
|
Mon, 04 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache apache Http Server |
|
| Vendors & Products |
Apache
Apache apache Http Server |
Mon, 04 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker. Users are recommended to upgrade to version 2.4.67, which fixes this issue. | |
| Title | Apache HTTP Server: mod_auth_digest timing attack | |
| Weaknesses | CWE-208 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-04T18:23:55.292Z
Reserved: 2026-03-17T16:42:48.946Z
Link: CVE-2026-33006
Updated: 2026-05-04T17:32:47.129Z
Status : Analyzed
Published: 2026-05-04T15:16:03.977
Modified: 2026-05-04T20:23:31.303
Link: CVE-2026-33006
No data.
OpenCVE Enrichment
Updated: 2026-05-04T21:15:06Z