The Apache Software Foundation has put out emergency security patches for two major flaws in the Apache Traffic Server This article explores safe version apache. . If these flaws aren't fixed, attackers from afar can use them to cause Denial-of-Service (DoS) conditions.
CVE-2025-58136 is the name of the most serious flaw that is currently being tracked. ATS is a high-performance web proxy cache that makes networks run more smoothly and handles huge amounts of enterprise web traffic. The Apache Software Foundation strongly suggests that everyone upgrade all of their installations to the most recent secure versions. Users on the 9.x branch should upgrade to version 9.1.13 or higher.
Organizations on the 10.X branch should upgrade to version 10.2.2 or later to fully protect themselves from threats. There is a temporary fix for the DoS vulnerability (CVE-20 25-58136) for teams that can't apply these updates right away.
Setting proxy.config.http_request_buffer_enabled to 0 can stop crashes from happening. This default setting keeps many servers safe, which is a good thing. There is no way to work around request smuggling vulnerabilities, which is too bad.
A full software upgrade is still the only way to keep the server environment safe from threats. Click here to learn more about how to upgrade your server to a safe version of Apache.












