CVE-2025-27452

5.3 MEDIUM

📋 TL;DR

This vulnerability affects Apache httpd webservers running the MEAC300-FNADE4 web application with unnecessary modules enabled. It allows directory listing, potentially exposing sensitive files and directory structures. Organizations using the MEAC300-FNADE4 web application with default or insecure Apache configurations are affected.

💻 Affected Systems

Products:
  • MEAC300-FNADE4 web application
Versions: All versions using vulnerable Apache httpd configuration
Operating Systems: Any OS running Apache httpd
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability depends on Apache configuration - specifically having unnecessary modules enabled that allow directory listing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate directory contents, discover sensitive files (configuration files, backups, credentials), and potentially access restricted files leading to further exploitation.

🟠

Likely Case

Information disclosure through directory listing, exposing file names and directory structures that could aid attackers in planning further attacks.

🟢

If Mitigated

Limited information exposure with proper access controls and monitoring in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory listing is a basic web server feature that can be accessed via standard HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Review Apache httpd configuration for the MEAC300-FNADE4 application
2. Disable unnecessary modules (particularly those enabling directory listing)
3. Restart Apache service
4. Verify directory listing is disabled

🔧 Temporary Workarounds

Disable Directory Listing in Apache

linux

Configure Apache to prevent directory listing by modifying directory directives

Edit Apache configuration (e.g., /etc/httpd/conf/httpd.conf or site-specific config)
Add or modify: Options -Indexes
Restart Apache: systemctl restart httpd

Disable Unnecessary Modules

all

Remove or comment out LoadModule directives for modules not required by MEAC300-FNADE4

Edit Apache configuration
Comment out unnecessary LoadModule lines: #LoadModule autoindex_module modules/mod_autoindex.so
Restart Apache

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block directory listing requests
  • Use network segmentation to restrict access to affected systems

🔍 How to Verify

Check if Vulnerable:

Access web application directories without index files and check if directory listing is displayed

Check Version:

httpd -v

Verify Fix Applied:

Attempt to access directories without index files and verify '403 Forbidden' or similar error appears instead of directory listing

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to directory paths without index files
  • Multiple GET requests to directory paths

Network Indicators:

  • HTTP requests to directories without file extensions
  • Pattern of requests exploring directory structures

SIEM Query:

source="apache_access" status=200 uri="/.*/$"

🔗 References

📤 Share & Export