Initiativen für
Als nationale Behörde für Cybersicherheit hat das ZCB mehrere Initiativen für bestimmte Zielgruppen entwickelt, die hier vorgestellt werden.
- Last update: 15-07-2025
- Affected software:
→ Apache HTTP Server: from 2.4.17 up to 2.4.63- Type: CWE-401: Missing Release of Memory after Effective Lifetime
- CVE/CVSS
→ CVE-2025-53020: CVSS 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Apache Foundation - https://httpd.apache.org/security/vulnerabilities_24.html
Apache HTTP Server is a widely used open-source web server that powers a significant portion of the internet’s infrastructure. CVE-2025-53020 is a high-severity vulnerability that allows a remote attacker to trigger a denial of service (DoS) condition by sending specially crafted HTTP requests.
Exploiting this flaw could disrupt access to web services and applications, impacting availability and business operations.
Organizations are strongly advised to apply the latest security updates to Apache HTTP Server to mitigate this risk and maintain service reliability.
CVE-2025-53020 is a memory management issue related to improper memory handling during the server's operation. It may lead to the host operating system killing the web server in order to reclaim memory. A remote attacker can send specially crafted HTTP requests to the server and perform a denial of service (DoS) attack.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.