A vital safety vulnerability in Apache Tomcat’s HTTP/2 implementation has been found, enabling attackers to launch devastating denial-of-service (DoS) assaults towards internet servers.
The vulnerability, designated as CVE-2025-48989 and dubbed the “Made You Reset” assault, impacts a number of variations of the favored Java servlet container and poses important dangers to internet functions worldwide.
The safety flaw, rated as Excessive severity, impacts Apache Tomcat variations 11.0.0-M1 by means of 11.0.9, 10.1.0-M1 by means of 10.1.43, and 9.0.0.M1 by means of 9.0.107.
Key Takeaways1. Apache Tomcat’s HTTP/2 flaw permits attackers to crash servers.2. Impacts Tomcat variations 9.0.0-11.0.9, doubtlessly impacting 1000’s of internet servers globally.3. Instantly improve to forestall exploitation.
Older end-of-life variations might also be susceptible, doubtlessly affecting 1000’s of internet servers globally.
The vulnerability was recognized by safety researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel from Tel Aviv College, who disclosed their findings on August 13, 2025.
Exploiting HTTP/2 in Apache Tomcat
The “Made You Reset” assault exploits weaknesses in Tomcat’s HTTP/2 protocol implementation, particularly focusing on the connection reset mechanism.
When efficiently executed, the assault usually manifests as an OutOfMemoryError, inflicting the focused server to exhaust its out there reminiscence sources and grow to be unresponsive to respectable requests.
The vulnerability lies in how Tomcat handles HTTP/2 stream resets and connection administration. Attackers can craft malicious HTTP/2 requests that pressure the server to allocate extreme reminiscence sources with out correctly releasing them.
This reminiscence leak conduct might be triggered repeatedly, finally overwhelming the server’s out there reminiscence pool and triggering a denial-of-service situation.
The assault vector leverages the HTTP/2 multiplexing function, the place a number of streams might be processed concurrently over a single TCP connection.
By manipulating stream reset frames and connection state administration, attackers can pressure Tomcat to keep up quite a few half-open connections or incomplete stream states, resulting in useful resource exhaustion.
Threat FactorsDetailsAffected Merchandise– Apache Tomcat 11.0.0-M1 to 11.0.9- Apache Tomcat 10.1.0-M1 to 10.1.43- Apache Tomcat 9.0.0.M1 to 9.0.107- Older EOL variations (doubtlessly affected)ImpactDenial of Service (DoS) attackExploit Stipulations– HTTP/2 protocol enabled on course server- Community entry to ship malicious HTTP/2 requests- Potential to craft HTTP/2 stream reset frames- No authentication requiredSeverityHigh
Mitigations
The Apache Software program Basis has launched patched variations to handle this vital vulnerability. Organizations operating affected Tomcat variations ought to instantly improve to Apache Tomcat 11.0.10, 10.1.44, or 9.0.108 or later variations.
These updates embrace fixes for the HTTP/2 implementation that forestall the “Made You Reset” assault vector.
System directors ought to prioritize these updates, notably for public-facing internet functions that settle for HTTP/2 connections.
The vulnerability’s Excessive severity score signifies that profitable exploitation might considerably impression service availability and enterprise operations.
Safety groups also needs to monitor their Tomcat installations for uncommon reminiscence consumption patterns and implement extra network-level protections, corresponding to price limiting and connection throttling, to mitigate potential assaults whereas patches are being deployed throughout their infrastructure.
Increase your SOC and assist your crew shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.