Recent DoS Vulnerabilities in Apache Tomcat

 


1. CVE-2025-48989 — “MadeYouReset” (HTTP/2 Rapid Reset Bypass)

  • What happened?
    On August 6, 2025, Apache Tomcat 9.0.108 was released to address a high‑severity DoS vulnerability—now known as the “MadeYouReset” attack. It exploits weaknesses in HTTP/2 stream reset handling, leading to c crashes by exhausting server memory Indusface+7Apache Tomcat+7The Hacker News+7.

  • Key details:
    A more recent report from today, August 14, 2025, confirms the vulnerability (CVE‑2025‑48989) is part of a broader HTTP/2 flaw (CVE‑2025‑8671) that also affects other servers like F5 BIG‑IP and Netty The Hacker News.

  • Affected versions:


2. CVE-2025-31650 — Malformed HTTP/2 Priority Header Memory Leak

  • Issue:
    Improper input validation on malformed HTTP/2 Priority headers causes memory leaks. A burst of such requests can trigger an OutOfMemoryError (DoS) Rapid7+11NVD+11Indusface+11.

  • Severity & scope:
    Rated high severity (CVSS 7.5) with low exploit complexity. No authentication is required Recorded Future+10Indusface+10myF5+10.

  • Affected versions:

    • Tomcat 9.0.76–9.0.102

    • Tomcat 10.1.10–10.1.39

    • Tomcat 11.0.0‑M2–11.0.5

  • Fix available:
    Upgrade to at least 9.0.104, 10.1.40, or 11.0.6 Apache Tomcat+7NVD+7Indusface+7.


3. Other DoS-related Vulnerabilities

  • CVE‑2025‑52434, CVE‑2025‑52520, CVE‑2025‑53506 (Belgium CCB Advisory)

    • CVE‑2025‑52434: Inadequate input validation with HTTP/2 + APR/native setup allows DoS via crafted requests.

    • CVE‑2025‑52520: File upload limit overflow. Crafted uploads cause DoS.

    • CVE‑2025‑53506: Poor stream resource control under HTTP/2—excessive use leads to resource exhaustion and DoS myF5+5ccb.belgium.be+5Indusface+5.

  • Prior vulnerabilities:


Summary Table

CVE IDWhat It DoesVulnerable VersionsMitigation / Fixed Version
CVE‑2025‑48989 (“MadeYouReset”)HTTP/2 stream resets causing memory exhaustionTomcat 9 ≤ 9.0.107; 10.1 ≤ 10.1.43; 11 ≤ 11.0.9Upgrade to Tomcat 9.0.108+ Apache Tomcat+2The Hacker News+2Recorded Future+5Cybersecurity News+5Indusface+5
CVE-2025-31650Malformed Priority headers leak memory → DoSTomcat 9.0.76–9.0.102; 10.1.10–10.1.39; 11.0.0-M2–11.0.5Upgrade to 9.0.104, 10.1.40, or 11.0.6 NVDIndusface
CVE-2025-52434 / 52520 / 53506HTTP/2 input, upload limits, stream exhaustion → DoSNot explicitly version bound (applies to vulnerable branches)Patch per CCB recommendation ccb.belgium.be

Your Action Plan

  1. Immediately upgrade your Tomcat servers:

    • For HTTP/2 DoS fix: Tomcat 9.0.108 or newer.

    • For Priority header memory leak: Tomcat 9.0.104, 10.1.40, 11.0.6, or newer.

  2. Apply additional mitigations while upgrading:

    • Implement rate limiting for suspicious HTTP/2 requests.

    • Deploy a Web Application Firewall (WAF) to catch malformed headers or uploads.

    • Monitor server memory and request patterns vigilantly.

  3. Maintain an updated patch cadence, especially for HTTP/2 and file upload modules—many recent DoS vectors exploit these.

Comments