The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-29169

CVE-2026-29169: Apache HTTP Server DoS Vulnerability

CVE-2026-29169 is a denial-of-service flaw in Apache HTTP Server's mod_dav_lock module that allows attackers to crash the server. This article covers the technical details, affected versions, and mitigation strategies.

Published: May 7, 2026

CVE-2026-29169 Overview

CVE-2026-29169 is a NULL pointer dereference vulnerability [CWE-476] in the mod_dav_lock module of Apache HTTP Server versions 2.4.66 and earlier. A remote attacker can crash the server by sending a malicious HTTP request to a server with mod_dav_lock enabled. The flaw affects availability only and does not expose data or allow code execution.

The mod_dav_lock module is not used internally by mod_dav or mod_dav_fs. Its only known consumer was mod_dav_svn from Apache Subversion releases earlier than 1.2.0. The Apache HTTP Server project recommends upgrading to version 2.4.66 or removing mod_dav_lock from the server configuration.

Critical Impact

Unauthenticated remote attackers can trigger a server crash with a single crafted request, producing a denial-of-service condition against any Apache HTTP Server instance loading mod_dav_lock.

Affected Products

  • Apache HTTP Server 2.4.66 and earlier (when mod_dav_lock is loaded)
  • Deployments using Apache Subversion mod_dav_svn versions earlier than 1.2.0
  • Any Apache HTTP Server configuration that enables mod_dav_lock for WebDAV locking

Discovery Timeline

  • 2026-05-04 - CVE-2026-29169 published to NVD
  • 2026-05-05 - Last updated in NVD database

Technical Details for CVE-2026-29169

Vulnerability Analysis

The vulnerability resides in mod_dav_lock, the Apache HTTP Server module that implements generic WebDAV locking on behalf of DAV providers. When the module processes a malicious request, an internal pointer remains uninitialized or unset before being dereferenced. The dereference occurs inside the worker process and aborts the request handler, terminating the process serving the connection.

Because mod_dav_lock is reachable over the network through standard HTTP request processing, the attack requires no authentication and no user interaction. Repeated requests can keep the affected workers in a crash loop, exhausting the server's capacity to serve legitimate clients. The flaw does not impact confidentiality or integrity, but it directly degrades availability.

Root Cause

The root cause is a missing NULL check on a pointer used during WebDAV lock processing inside mod_dav_lock. The module assumes that a structure populated earlier in the request lifecycle is always present. Specially crafted input bypasses that assumption and reaches the dereference path with a NULL pointer, triggering a segmentation fault.

Attack Vector

An unauthenticated attacker sends a malicious WebDAV request over the network to an Apache HTTP Server instance that loads mod_dav_lock. The request reaches the lock-handling code path before validation completes, the dereference fires, and the worker process crashes. No special tooling, credentials, or local access is required. The vulnerability is described in prose only because no public proof-of-concept is available; refer to the Apache HTTPD Vulnerabilities List for upstream technical context.

Detection Methods for CVE-2026-29169

Indicators of Compromise

  • Apache error_log entries showing segmentation faults or child pid ... exit signal Segmentation fault (11) messages tied to WebDAV request handlers.
  • Sudden spikes in worker process restarts on hosts running mod_dav_lock without a corresponding configuration change.
  • Inbound HTTP requests using WebDAV methods such as LOCK, UNLOCK, PROPFIND, or MKCOL from unexpected sources.

Detection Strategies

  • Inventory loaded Apache modules with apachectl -M and flag any host that lists dav_lock_module as active.
  • Correlate worker crash events in error_log with access log entries from the same timeframe to identify the triggering request.
  • Alert on repeated 5xx responses or connection resets from URLs that map to WebDAV-enabled locations.

Monitoring Recommendations

  • Forward Apache access_log and error_log to a centralized logging platform and build dashboards for WebDAV method volume and worker crash frequency.
  • Monitor process supervision counters (systemd, supervisord) for abnormal Apache child restart rates.
  • Track HTTP method distribution at the network edge to detect WebDAV traffic against servers that should not expose DAV.

How to Mitigate CVE-2026-29169

Immediate Actions Required

  • Upgrade Apache HTTP Server to version 2.4.66 or later on every host that loads mod_dav_lock.
  • If an immediate upgrade is not possible, disable mod_dav_lock by removing or commenting out its LoadModule directive and restarting Apache.
  • Audit Subversion deployments and upgrade any mod_dav_svn instance older than 1.2.0, since that is the only known consumer of mod_dav_lock.

Patch Information

The Apache HTTP Server project fixed the NULL pointer dereference in version 2.4.66. Administrators should consult the Apache HTTPD Vulnerabilities List and the OpenWall OSS-Security announcement for upstream details, then apply vendor-supplied packages from their Linux distribution as soon as they become available.

Workarounds

  • Remove the LoadModule dav_lock_module directive from httpd.conf if WebDAV locking is not required.
  • Restrict access to WebDAV-enabled paths using Require directives, IP allowlists, or upstream reverse proxy rules until patching is complete.
  • Block WebDAV HTTP methods (LOCK, UNLOCK, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE) at the web application firewall for hosts that do not need DAV functionality.
bash
# Disable mod_dav_lock until patching is complete
# Debian/Ubuntu
sudo a2dismod dav_lock
sudo systemctl restart apache2

# RHEL/CentOS - comment out the LoadModule line
sudo sed -i 's|^LoadModule dav_lock_module|#LoadModule dav_lock_module|' \
    /etc/httpd/conf.modules.d/00-dav.conf
sudo systemctl restart httpd

# Verify the module is no longer loaded
apachectl -M | grep -i dav_lock

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechApache

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.28%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Technical References
  • OpenWall OSS-Security Mailing List Post

  • OpenWall OSS-Security Mailing List Post
  • Vendor Resources
  • Apache HTTPD Vulnerabilities List
  • Related CVEs
  • CVE-2026-33007: Apache HTTP Server DOS Vulnerability

  • CVE-2026-2717: HTTP Headers Plugin DoS Vulnerability

  • CVE-2022-28615: Apache HTTP Server DOS Vulnerability

  • CVE-2025-55753: Apache HTTP Server DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English