Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaws in Apache Traffic Server Demand Immediate Updates

Critical Flaws in Apache Traffic Server Demand Immediate Updates

Posted on April 6, 2026 By CWS

The Apache Software Foundation has announced urgent security patches to fix two critical vulnerabilities in the Apache Traffic Server (ATS), a widely-used high-performance web proxy cache. These vulnerabilities, if left unattended, allow remote attackers to initiate Denial-of-Service (DoS) attacks or conduct sophisticated HTTP request smuggling against enterprise networks.

Understanding the Security Flaws

The first of these vulnerabilities, identified as CVE-2025-58136, was uncovered by security researcher Masakazu Kitajo. It involves a flaw where a standard HTTP POST request can crash the ATS application, leading to a Denial-of-Service scenario. Since POST requests are commonly used to send data to web servers, this flaw is particularly accessible to attackers.

When exploited, this vulnerability can incapacitate the entire proxy server, cutting off access for all users dependent on it. This highlights the critical need for immediate attention from administrators overseeing affected systems.

Impact of HTTP Request Smuggling

The second vulnerability, tracked as CVE-2025-65114, was discovered by security researcher Katsutoshi Ikenoya. This flaw relates to the improper handling of malformed chunked message bodies during data transmission. Attackers can exploit this to perform HTTP request smuggling, a technique that allows them to alter the processing of HTTP request sequences.

Such manipulation can lead to bypassing security measures, poisoning web caches, or unauthorized access to sensitive data on downstream servers. The potential ramifications of this vulnerability are severe, necessitating immediate action.

Recommended Security Measures

Administrators managing ATS versions 9.0.0 through 9.2.12, and 10.0.0 through 10.1.1, are advised to update to the latest secure releases. Specifically, users of the 9.x branch should upgrade to version 9.1.13 or newer, while those on the 10.x branch need to update to version 10.1.2 or later.

For those unable to implement the updates immediately, a temporary workaround for the DoS vulnerability (CVE-2025-58136) involves setting the proxy.config.http.request_buffer_enabled parameter to 0, which is the default configuration. Unfortunately, there is no such workaround for the request smuggling flaw (CVE-2025-65114), making a full software upgrade essential.

The Apache Software Foundation emphasizes the importance of these updates to maintain network security. Administrators are urged to act swiftly to protect their systems from potential threats posed by these vulnerabilities.

Cyber Security News Tags:Apache Traffic Server, CVE-2025-58136, CVE-2025-65114, Cybersecurity, denial of service, enterprise networks, HTTP request smuggling, network security, Remote Attacks, security advisory, security update, software patch, Vulnerabilities, web proxy cache

Post navigation

Previous Post: Node.js Maintainers Targeted by North Korean Hackers
Next Post: Dgraph Database Flaw Endangers Security with Bypass Vulnerability

Related Posts

Everest Hacking Group Allegedly Claims Breach of Nissan Motors Everest Hacking Group Allegedly Claims Breach of Nissan Motors Cyber Security News
Hackers Accessed Customer Data From Salesforce Hackers Accessed Customer Data From Salesforce Cyber Security News
ZAP JavaScript Engine Memory Leak Issue Impacts Active Scan Usage ZAP JavaScript Engine Memory Leak Issue Impacts Active Scan Usage Cyber Security News
Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication Cyber Security News
FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes Cyber Security News
Critical Flaw in API Keys Plugin Enables Account Takeovers Critical Flaw in API Keys Plugin Enables Account Takeovers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Optimize SOC Efficiency by Tackling Multi-OS Threats
  • Dgraph Database Flaw Endangers Security with Bypass Vulnerability
  • Critical Flaws in Apache Traffic Server Demand Immediate Updates
  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Optimize SOC Efficiency by Tackling Multi-OS Threats
  • Dgraph Database Flaw Endangers Security with Bypass Vulnerability
  • Critical Flaws in Apache Traffic Server Demand Immediate Updates
  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark