oss-sec mailing list archives

CVE-2025-23419: nginx: Client certificate authentication bypass with TLSv1.3 and session resumption


From: Solar Designer <solar () openwall com>
Date: Wed, 5 Feb 2025 18:35:29 +0100

----- Forwarded message from F5SIRT via nginx-announce <nginx-announce () nginx org> -----

To: "nginx-announce () nginx org" <nginx-announce () nginx org>
Date: Wed, 5 Feb 2025 17:23:12 +0000
Subject: [nginx-announce] nginx security advisory (CVE-2025-23419)
From: F5SIRT via nginx-announce <nginx-announce () nginx org>
Reply-To: F5SIRT <f5sirt () F5 com>

A problem with SSL session resumption in nginx was identified.
It was possible to reuse SSL sessions in named-based
virtual hosts in unrelated contexts, allowing to bypass client
certificate authentication in some configurations (CVE-2025-23419).

The problem affects nginx 1.11.4 and newer built with OpenSSL if the
TLSv1.3 protocol and session resumption are enabled either with
ssl_session_cache or ssl_session_tickets.

The problem is fixed in 1.26.3 and 1.27.4.
_______________________________________________
nginx-announce mailing list
nginx-announce () nginx org
https://mailman.nginx.org/mailman/listinfo/nginx-announce

----- End forwarded message -----


Current thread: