Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack

Posted on August 14, 2025August 14, 2025 By CWS

A vital safety vulnerability in Apache Tomcat’s HTTP/2 implementation has been found, enabling attackers to launch devastating denial-of-service (DoS) assaults towards internet servers. 

The vulnerability, designated as CVE-2025-48989 and dubbed the “Made You Reset” assault, impacts a number of variations of the favored Java servlet container and poses important dangers to internet functions worldwide.

The safety flaw, rated as Excessive severity, impacts Apache Tomcat variations 11.0.0-M1 by means of 11.0.9, 10.1.0-M1 by means of 10.1.43, and 9.0.0.M1 by means of 9.0.107. 

Key Takeaways1. Apache Tomcat’s HTTP/2 flaw permits attackers to crash servers.2. Impacts Tomcat variations 9.0.0-11.0.9, doubtlessly impacting 1000’s of internet servers globally.3. Instantly improve to forestall exploitation.

Older end-of-life variations might also be susceptible, doubtlessly affecting 1000’s of internet servers globally. 

The vulnerability was recognized by safety researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel from Tel Aviv College, who disclosed their findings on August 13, 2025.

Exploiting HTTP/2 in Apache Tomcat 

The “Made You Reset” assault exploits weaknesses in Tomcat’s HTTP/2 protocol implementation, particularly focusing on the connection reset mechanism. 

When efficiently executed, the assault usually manifests as an OutOfMemoryError, inflicting the focused server to exhaust its out there reminiscence sources and grow to be unresponsive to respectable requests.

The vulnerability lies in how Tomcat handles HTTP/2 stream resets and connection administration. Attackers can craft malicious HTTP/2 requests that pressure the server to allocate extreme reminiscence sources with out correctly releasing them. 

This reminiscence leak conduct might be triggered repeatedly, finally overwhelming the server’s out there reminiscence pool and triggering a denial-of-service situation.

The assault vector leverages the HTTP/2 multiplexing function, the place a number of streams might be processed concurrently over a single TCP connection. 

By manipulating stream reset frames and connection state administration, attackers can pressure Tomcat to keep up quite a few half-open connections or incomplete stream states, resulting in useful resource exhaustion.

Threat FactorsDetailsAffected Merchandise– Apache Tomcat 11.0.0-M1 to 11.0.9- Apache Tomcat 10.1.0-M1 to 10.1.43- Apache Tomcat 9.0.0.M1 to 9.0.107- Older EOL variations (doubtlessly affected)ImpactDenial of Service (DoS) attackExploit Stipulations– HTTP/2 protocol enabled on course server- Community entry to ship malicious HTTP/2 requests- Potential to craft HTTP/2 stream reset frames- No authentication requiredSeverityHigh

Mitigations 

The Apache Software program Basis has launched patched variations to handle this vital vulnerability. Organizations operating affected Tomcat variations ought to instantly improve to Apache Tomcat 11.0.10, 10.1.44, or 9.0.108 or later variations. 

These updates embrace fixes for the HTTP/2 implementation that forestall the “Made You Reset” assault vector.

System directors ought to prioritize these updates, notably for public-facing internet functions that settle for HTTP/2 connections. 

The vulnerability’s Excessive severity score signifies that profitable exploitation might considerably impression service availability and enterprise operations.

Safety groups also needs to monitor their Tomcat installations for uncommon reminiscence consumption patterns and implement extra network-level protections, corresponding to price limiting and connection throttling, to mitigate potential assaults whereas patches are being deployed throughout their infrastructure.

Increase your SOC and assist your crew shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Apache, Attack, Attackers, DoS, Tomcat, Trigger, Vulnerabilities

Post navigation

Previous Post: Adobe’s August 2025 Patch Tuesday
Next Post: Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Related Posts

Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Cyber Security News
PhantomVAI Loader Attacking Organizations Worldwide to Deliver AsyncRAT, XWorm, FormBook and DCRat Cyber Security News
Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers Cyber Security News
Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users Cyber Security News
QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code Cyber Security News
Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark