CVE-2025-49630

7.5 HIGH

📋 TL;DR

This vulnerability allows untrusted clients to trigger a denial of service attack against Apache HTTP Server by causing an assertion failure in the mod_proxy_http2 module. It affects Apache HTTP Server versions 2.4.26 through 2.4.63 configured as reverse proxies with HTTP/2 backends and ProxyPreserveHost set to 'on'. Organizations using affected proxy configurations are at risk of service disruption.

💻 Affected Systems

Products:
  • Apache HTTP Server
Versions: 2.4.26 through 2.4.63
Operating Systems: All operating systems running affected Apache versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured as reverse proxy with HTTP/2 backend and ProxyPreserveHost set to 'on'

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of the Apache HTTP Server instance, making reverse proxy services unavailable to legitimate users.

🟠

Likely Case

Service disruption causing intermittent downtime or degraded performance of proxied applications.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring to detect and block attack attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending specially crafted requests to trigger the assertion failure

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.64 or later

Vendor Advisory: https://httpd.apache.org/security/vulnerabilities_24.html

Restart Required: Yes

Instructions:

1. Download Apache HTTP Server 2.4.64 or later from the official Apache website. 2. Backup current configuration files. 3. Install the updated version following your operating system's package management procedures. 4. Restart the Apache service to apply the fix.

🔧 Temporary Workarounds

Disable ProxyPreserveHost

all

Set ProxyPreserveHost to 'off' in vulnerable proxy configurations

Edit Apache configuration file and set: ProxyPreserveHost off
Then restart Apache: sudo systemctl restart apache2

Disable HTTP/2 for backend connections

all

Configure proxy to use HTTP/1.1 instead of HTTP/2 for backend connections

Edit proxy configuration to use: ProxyPass / http://backend.example.com/ connectiontimeout=5 timeout=30
Then restart Apache: sudo systemctl restart apache2

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to proxy endpoints
  • Deploy WAF rules to detect and block suspicious proxy requests

🔍 How to Verify

Check if Vulnerable:

Check Apache version with 'httpd -v' and review configuration for ProxyPreserveHost on with HTTP/2 backend

Check Version:

httpd -v

Verify Fix Applied:

Verify Apache version is 2.4.64 or higher with 'httpd -v'

📡 Detection & Monitoring

Log Indicators:

  • Apache assertion failures in error logs
  • Unexpected child process terminations
  • Increased 500 error responses from proxy

Network Indicators:

  • Unusual spike in requests to proxy endpoints
  • Pattern of requests causing service restarts

SIEM Query:

source="apache_error.log" AND ("assertion" OR "mod_proxy_http2" OR "child pid.*exit")

🔗 References

📤 Share & Export