The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-11993

CVE-2020-11993: Apache HTTP Server DoS Vulnerability

CVE-2020-11993 is a denial of service vulnerability in Apache HTTP Server versions 2.4.20 to 2.4.43 caused by improper memory pool handling in HTTP/2 module logging. This article covers technical details, impact, and mitigations.

Published: March 4, 2026

CVE-2020-11993 Overview

CVE-2020-11993 is a race condition vulnerability affecting Apache HTTP Server versions 2.4.20 through 2.4.43. The flaw exists within the mod_http2 module and occurs when trace or debug logging is enabled. Under certain HTTP/2 traffic patterns, logging statements are executed on the wrong connection context, leading to concurrent use of memory pools. This can result in memory corruption and denial of service conditions.

The vulnerability is particularly concerning for organizations that have enabled verbose logging on production servers for troubleshooting purposes. An unauthenticated remote attacker can exploit this issue by sending specially crafted HTTP/2 requests that trigger the edge case traffic patterns, causing the server to crash or become unresponsive.

Critical Impact

Remote attackers can cause denial of service against Apache HTTP servers with HTTP/2 and debug logging enabled, potentially disrupting critical web services.

Affected Products

  • Apache HTTP Server versions 2.4.20 to 2.4.43
  • NetApp Clustered Data ONTAP
  • Canonical Ubuntu Linux 16.04, 18.04, and 20.04 LTS
  • openSUSE Leap 15.1 and 15.2
  • Debian Linux 10.0
  • Fedora 31 and 32
  • Oracle Communications Element Manager
  • Oracle Communications Session Report Manager
  • Oracle Communications Session Route Manager
  • Oracle Enterprise Manager Ops Center 12.4.0.0
  • Oracle Hyperion Infrastructure Technology 11.1.2.4
  • Oracle Instantis EnterpriseTrack 17.1, 17.2, and 17.3
  • Oracle ZFS Storage Appliance Kit 8.8

Discovery Timeline

  • 2020-08-07 - CVE-2020-11993 published to NVD
  • 2025-05-01 - Last updated in NVD database

Technical Details for CVE-2020-11993

Vulnerability Analysis

This vulnerability stems from a race condition in the HTTP/2 module (mod_http2) of Apache HTTP Server. When debug or trace logging is configured for the module, certain traffic edge patterns cause logging operations to be performed on incorrect connection contexts. This results in multiple threads concurrently accessing and modifying the same memory pools without proper synchronization.

The issue is classified as CWE-444 (Inconsistent Interpretation of HTTP Requests), though it fundamentally involves a race condition in memory pool management. The vulnerability can be exploited remotely over the network without requiring authentication, and successful exploitation leads to denial of service through memory corruption or server crashes.

Root Cause

The root cause lies in improper connection context handling within the mod_http2 logging code paths. When HTTP/2 connections experience specific traffic patterns—particularly those involving rapid connection state transitions—the module's logging functions may reference stale or incorrect connection objects. This leads to logging statements being associated with wrong connection contexts, causing memory pool operations intended for one connection to be executed against another connection's memory pool. Since Apache uses per-connection memory pools for efficient resource management, this cross-contamination corrupts pool metadata and triggers undefined behavior.

Attack Vector

The attack leverages the network-accessible HTTP/2 protocol to trigger the vulnerable code path. An attacker can exploit this vulnerability by:

  1. Establishing multiple HTTP/2 connections to the target server
  2. Sending rapid sequences of requests that create specific traffic edge patterns
  3. Causing connection state transitions that trigger the race condition in logging code
  4. Inducing memory pool corruption that crashes worker processes or the entire server

The attack does not require authentication and can be performed remotely. However, the vulnerability only manifests when mod_http2 logging is configured above the "info" level (i.e., debug or trace levels). This represents a common configuration for servers undergoing troubleshooting or performance analysis.

Detection Methods for CVE-2020-11993

Indicators of Compromise

  • Apache HTTP Server child process crashes or unexpected restarts, particularly under HTTP/2 traffic
  • Segmentation faults or memory corruption errors in Apache error logs referencing mod_http2
  • Inconsistent or corrupted log entries where logging statements appear associated with wrong connections
  • Elevated HTTP/2 connection failures or protocol errors reported by clients

Detection Strategies

  • Monitor Apache error logs for segfault messages, particularly those mentioning h2_ prefixed functions or memory pool operations
  • Implement process monitoring to detect abnormal httpd worker process termination rates
  • Deploy web application firewall rules to detect anomalous HTTP/2 connection patterns characteristic of exploitation attempts
  • Use system-level monitoring tools like auditd to track unexpected Apache process crashes

Monitoring Recommendations

  • Configure centralized log aggregation to correlate Apache crashes across multiple servers for early detection of exploitation campaigns
  • Set up alerts for Apache process restart frequency exceeding baseline thresholds
  • Monitor HTTP/2 connection metrics for unusual patterns such as high connection churn or elevated error rates
  • Review Apache configuration periodically to identify servers with debug logging enabled in production environments

How to Mitigate CVE-2020-11993

Immediate Actions Required

  • Upgrade Apache HTTP Server to version 2.4.44 or later, which contains the security fix for this vulnerability
  • As a temporary mitigation, configure the LogLevel of mod_http2 to "info" or lower to prevent triggering the vulnerable code path
  • Review all production Apache servers to identify instances with HTTP/2 debug logging enabled and reduce logging verbosity
  • Consider temporarily disabling mod_http2 if HTTP/2 support is not critical while waiting for patching

Patch Information

Apache has released version 2.4.44 which addresses CVE-2020-11993 along with other security issues. The fix corrects the connection context handling in the mod_http2 logging code to ensure logging operations are performed against the correct connection's memory pool. Organizations should apply updates through their distribution's package manager or by downloading the patched version from the Apache HTTPD Security Vulnerabilities page.

Multiple Linux distributions have released patches for this vulnerability. Refer to distribution-specific security advisories including Debian Security Advisory DSA-4757, Ubuntu Security Notice USN-4458-1, and the Gentoo GLSA 202008-04 for guidance on applying updates.

Workarounds

  • Set LogLevel h2:info or lower in the Apache configuration to prevent the vulnerable debug logging code paths from being executed
  • Disable the mod_http2 module entirely by commenting out or removing the LoadModule http2_module directive if HTTP/2 is not required
  • Implement network-level rate limiting for HTTP/2 connections to reduce the likelihood of triggering exploitation patterns
  • Consider deploying a reverse proxy in front of vulnerable Apache servers that can handle HTTP/2 termination while Apache operates with HTTP/1.1 only
bash
# Mitigate CVE-2020-11993 by reducing mod_http2 log level
# Add to httpd.conf or apache2.conf

# Set HTTP/2 module logging to info level (default is warn)
LogLevel h2:info

# Alternative: Completely disable HTTP/2 module if not needed
# Comment out or remove the following line:
# LoadModule http2_module modules/mod_http2.so

# Restart Apache to apply changes
# systemctl restart httpd   # RHEL/CentOS
# systemctl restart apache2 # Debian/Ubuntu

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechApache

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability18.21%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-444
  • Technical References
  • openSUSE Security Announcement

  • openSUSE Security Announcement

  • openSUSE Security Announcement

  • Packet Storm Security Analysis

  • Apache Commit Discussion

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA Advisory

  • NetApp Security Advisory

  • Ubuntu Security Notice

  • Debian Security Advisory
  • Vendor Resources
  • Apache HTTPD Security Vulnerability

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Apache Commit Discussion

  • Oracle January 2021 Security Alert
  • Related CVEs
  • CVE-2022-28615: Apache HTTP Server DOS Vulnerability

  • CVE-2025-55753: Apache HTTP Server DoS Vulnerability

  • CVE-2024-36387: Apache HTTP Server DoS Vulnerability

  • CVE-2025-49630: Apache HTTP Server DOS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English