{
  "threat_severity" : "Important",
  "public_date" : "2025-12-05T10:12:22Z",
  "bugzilla" : {
    "description" : "mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals",
    "id" : "2419140",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2419140"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-190",
  "details" : [ "An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.", "An integer overflow flaw has been discovered in the Apache HTTP server. The integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds." ],
  "affected_release" : [ {
    "product_name" : "JBoss Core Services for RHEL 8",
    "release_date" : "2026-02-23T00:00:00Z",
    "advisory" : "RHSA-2026:2994",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el8",
    "package" : "jbcs-httpd24-mod_md-1:2.4.28-13.el8jbcs"
  }, {
    "product_name" : "JBoss Core Services on RHEL 7",
    "release_date" : "2026-02-23T00:00:00Z",
    "advisory" : "RHSA-2026:2994",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el7",
    "package" : "jbcs-httpd24-mod_md-1:2.4.28-13.el7jbcs"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2025-12-22T00:00:00Z",
    "advisory" : "RHSA-2025:23738",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "mod_md-1:2.4.26-4.el10_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10.0 Extended Update Support",
    "release_date" : "2026-01-06T00:00:00Z",
    "advisory" : "RHSA-2026:0093",
    "cpe" : "cpe:/o:redhat:enterprise_linux_eus:10.0",
    "package" : "mod_md-1:2.4.26-3.el10_0.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-12-22T00:00:00Z",
    "advisory" : "RHSA-2025:23732",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "httpd:2.4-8100020251212173309.489197e6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0009",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "httpd:2.4-8020020251223095446.4cda2c84"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0010",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "httpd:2.4-8040020251223095736.522a0ee4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0010",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "httpd:2.4-8040020251223095736.522a0ee4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0011",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "httpd:2.4-8060020251223095927.ad008a3a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0011",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "httpd:2.4-8060020251223095927.ad008a3a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0011",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "httpd:2.4-8060020251223095927.ad008a3a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0012",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "httpd:2.4-8080020251223093308.63b34585"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0012",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "httpd:2.4-8080020251223093308.63b34585"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-12-22T00:00:00Z",
    "advisory" : "RHSA-2025:23739",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "mod_md-1:2.4.26-1.el9_7.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2026-01-06T00:00:00Z",
    "advisory" : "RHSA-2026:0092",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "mod_md-1:2.4.0-3.el9_0.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0030",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "mod_md-1:2.4.19-1.el9_2.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-01-05T00:00:00Z",
    "advisory" : "RHSA-2026:0029",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "mod_md-1:2.4.19-1.el9_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-01-06T00:00:00Z",
    "advisory" : "RHSA-2026:0094",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "mod_md-1:2.4.26-1.el9_6.1"
  }, {
    "product_name" : "Red Hat JBoss Core Services 2.4.62.SP3",
    "release_date" : "2026-02-23T00:00:00Z",
    "advisory" : "RHSA-2026:2995",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1",
    "package" : "jbcs-httpd24-httpd"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "httpd",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "httpd",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-55753\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-55753\nhttps://httpd.apache.org/security/vulnerabilities_24.html" ],
  "name" : "CVE-2025-55753",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}