Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.153971
Category:Web Servers
Title:Nginx 1.11.4 - 1.27.3 TLS Session Resumption Vulnerability
Summary:Nginx is prone to a TLS session resumption vulnerability.
Description:Summary:
Nginx is prone to a TLS session resumption vulnerability.

Vulnerability Insight:
When name-based virtual hosts are configured to share the same
IP address and port combination, with TLS 1.3 and OpenSSL, a previously authenticated attacker
can use session resumption to bypass client certificate authentication requirements on these
servers. This vulnerability arises when TLS session tickets are used and/or the SSL session cache
is used in the default virtual server and the default virtual server is performing client
certificate authentication. This issue affects both the NGINX http and NGINX stream modules.

Vulnerability Impact:
This vulnerability can lead to the exposure of resources or
functionality to unintended actors, possibly providing attackers with limited access to sensitive
information.

Affected Software/OS:
Nginx versions 1.11.4 through 1.27.3.

Solution:
Update to version 1.26.3, 1.27.4 or later.

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2025-23419
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.