Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack

Posted on August 14, 2025August 14, 2025 By CWS

A vital safety vulnerability in Apache Tomcat’s HTTP/2 implementation has been found, enabling attackers to launch devastating denial-of-service (DoS) assaults towards internet servers. 

The vulnerability, designated as CVE-2025-48989 and dubbed the “Made You Reset” assault, impacts a number of variations of the favored Java servlet container and poses important dangers to internet functions worldwide.

The safety flaw, rated as Excessive severity, impacts Apache Tomcat variations 11.0.0-M1 by means of 11.0.9, 10.1.0-M1 by means of 10.1.43, and 9.0.0.M1 by means of 9.0.107. 

Key Takeaways1. Apache Tomcat’s HTTP/2 flaw permits attackers to crash servers.2. Impacts Tomcat variations 9.0.0-11.0.9, doubtlessly impacting 1000’s of internet servers globally.3. Instantly improve to forestall exploitation.

Older end-of-life variations might also be susceptible, doubtlessly affecting 1000’s of internet servers globally. 

The vulnerability was recognized by safety researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel from Tel Aviv College, who disclosed their findings on August 13, 2025.

Exploiting HTTP/2 in Apache Tomcat 

The “Made You Reset” assault exploits weaknesses in Tomcat’s HTTP/2 protocol implementation, particularly focusing on the connection reset mechanism. 

When efficiently executed, the assault usually manifests as an OutOfMemoryError, inflicting the focused server to exhaust its out there reminiscence sources and grow to be unresponsive to respectable requests.

The vulnerability lies in how Tomcat handles HTTP/2 stream resets and connection administration. Attackers can craft malicious HTTP/2 requests that pressure the server to allocate extreme reminiscence sources with out correctly releasing them. 

This reminiscence leak conduct might be triggered repeatedly, finally overwhelming the server’s out there reminiscence pool and triggering a denial-of-service situation.

The assault vector leverages the HTTP/2 multiplexing function, the place a number of streams might be processed concurrently over a single TCP connection. 

By manipulating stream reset frames and connection state administration, attackers can pressure Tomcat to keep up quite a few half-open connections or incomplete stream states, resulting in useful resource exhaustion.

Threat FactorsDetailsAffected Merchandise– Apache Tomcat 11.0.0-M1 to 11.0.9- Apache Tomcat 10.1.0-M1 to 10.1.43- Apache Tomcat 9.0.0.M1 to 9.0.107- Older EOL variations (doubtlessly affected)ImpactDenial of Service (DoS) attackExploit Stipulations– HTTP/2 protocol enabled on course server- Community entry to ship malicious HTTP/2 requests- Potential to craft HTTP/2 stream reset frames- No authentication requiredSeverityHigh

Mitigations 

The Apache Software program Basis has launched patched variations to handle this vital vulnerability. Organizations operating affected Tomcat variations ought to instantly improve to Apache Tomcat 11.0.10, 10.1.44, or 9.0.108 or later variations. 

These updates embrace fixes for the HTTP/2 implementation that forestall the “Made You Reset” assault vector.

System directors ought to prioritize these updates, notably for public-facing internet functions that settle for HTTP/2 connections. 

The vulnerability’s Excessive severity score signifies that profitable exploitation might considerably impression service availability and enterprise operations.

Safety groups also needs to monitor their Tomcat installations for uncommon reminiscence consumption patterns and implement extra network-level protections, corresponding to price limiting and connection throttling, to mitigate potential assaults whereas patches are being deployed throughout their infrastructure.

Increase your SOC and assist your crew shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Apache, Attack, Attackers, DoS, Tomcat, Trigger, Vulnerabilities

Post navigation

Previous Post: Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
Next Post: Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Related Posts

FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches Cyber Security News
Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365 Cyber Security News
Russian Vodka Producer Beluga Hit by Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
  • CISA Warns of Attacks Exploiting N-able Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
  • CISA Warns of Attacks Exploiting N-able Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News