Apache HTTP Server ACME Backoff Timer Exploit

HIGH (7.5) Partial Fix

Threat Intelligence

Low Risk
EPSS Score: 0.08% chance of exploitation (percentile: 25%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Apache HTTP Server is a widely used web server software. This vulnerability affects the mod_md module, which handles ACME certificate renewal. When the ACME certificate renewal process fails, the backoff timer becomes 0, causing repeated attempts without delays until it succeeds.

Am I affected?

You're affected if you use An. Affected versions: 2.4.66

Affected Packages

maven: org.apache.httpcomponents:httpclient

Affected Products

Apache Software Foundation / Apache HTTP Server

How to fix

Upgrade to version 2.4.66, which fixes the issue.
* Maven: Update your pom.xml dependency version
* Package manager (e.g., apt-get, yum): apt-get install apache2 or yum install httpd
- Immediate mitigations:
* Restrict network access to your Apache HTTP Server instance (firewall it from the public internet)
* Audit admin account activity for suspicious access patterns
* Monitor for unauthorized token creation