Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks

Posted on July 9, 2025July 9, 2025 By CWS

Apache Tomcat has addressed three important denial-of-service (DoS) vulnerabilities that might permit malicious actors to disrupt net purposes and providers. 

These safety flaws, tracked as CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506, have an effect on all Apache Tomcat variations from 9.0.0.M1 to 9.0.106. 

The vulnerabilities exploit completely different assault vectors, together with HTTP/2 protocol weaknesses, file add mechanisms, and stream dealing with capabilities. 

Key Takeaways1. CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506 have an effect on Apache Tomcat 9.0.0.M1 to 9.0.106, permitting distant denial-of-service assaults.2. Exploits goal the HTTP/2 protocol with APR/Native, file add integer overflow, and extreme HTTP/2 stream creation.3. All vulnerabilities have been patched by way of particular commits implementing correct validation and useful resource limits.4. Speedy improve to model 9.0.107 is required as exploits want no authentication.

Organizations operating affected variations ought to instantly improve to Apache Tomcat 9.0.107 to mitigate these safety dangers and stop potential service disruptions.

HTTP/2 and APR/Native Flaw (CVE-2025-52434)

The primary vulnerability, CVE-2025-52434, represents a important flaw in Apache Tomcat’s HTTP/2 implementation when used with the APR/Native connector. 

This vulnerability permits attackers to set off denial-of-service circumstances by exploiting weaknesses within the HTTP/2 protocol dealing with mechanisms. 

The APR/Native connector, which gives enhanced efficiency by way of native library integration, turns into vulnerable to useful resource exhaustion assaults when processing malformed or extreme HTTP/2 requests.

The safety crew addressed this problem by way of commit 8a83c3c4, which implements correct validation and useful resource administration for HTTP/2 connections. 

System directors using APR/Native connectors with HTTP/2 enabled ought to prioritize this replace, because the vulnerability could be exploited remotely with out authentication. 

The repair introduces stricter boundary checks and connection lifecycle administration to forestall useful resource depletion situations.

Integer Overflow in File Uploads (CVE-2025-52520)

CVE-2025-52520 exploits integer overflow circumstances in Apache Tomcat’s file add processing mechanism. 

Attackers can craft malicious multipart/form-data requests with specifically crafted Content material-Size headers that set off integer overflow vulnerabilities, doubtlessly bypassing file dimension restrictions and inflicting reminiscence exhaustion. 

This vulnerability impacts purposes that deal with file uploads by way of servlet containers. The remediation, carried out in commit 927d66fb, introduces strong enter validation and correct integer bounds checking for file add operations. 

The repair ensures that maxRequestSize and maxFileSize parameters are correctly validated earlier than processing, stopping overflow circumstances that might result in limitless reminiscence allocation. 

Net purposes with file add performance ought to implement further validation layers on the utility stage as a defense-in-depth technique.

Extreme HTTP/2 Streams (CVE-2025-53506)

The third vulnerability, CVE-2025-53506, permits attackers to overwhelm Apache Tomcat servers by creating extreme HTTP/2 streams inside a single connection. 

This assault vector exploits the HTTP/2 multiplexing function, the place a number of streams could be processed concurrently over a single TCP connection. Malicious purchasers can quickly create quite a few streams, exhausting server reminiscence and processing assets.

Commit 43477293 addresses this vulnerability by implementing correct stream rely limitations and useful resource administration insurance policies. 

CVEsDescriptionSeverityCVE-2025-52434Denial-of-Service vulnerability in HTTP/2 implementation used with APR/Native connector.ImportantCVE-2025-52520Integer overflow vulnerability in file add dealing with mechanism.ImportantCVE-2025-53506Denial-of-Service by way of extreme HTTP/2 stream creation.Necessary

The repair introduces configurable parameters for max concurrent streams per connection and implements sleek degradation mechanisms when limits are approached. 

Community directors ought to configure applicable values for maxConcurrentStreams and monitor HTTP/2 connection patterns to detect potential abuse.

Organizations operating affected Apache Tomcat variations ought to instantly improve to 9.0.107 and evaluation their safety configurations to mitigate these important vulnerabilities.

Assume like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now

Cyber Security News Tags:Apache, Attackers, Attacks, DoS, Multiple, Tomcat, Trigger, Vulnerabilities

Post navigation

Previous Post: Canadian Electric Utility Says Power Meters Disrupted by Cyberattack
Next Post: Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking

Related Posts

Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines Cyber Security News
Firefox 140 Released With Fix for Code Execution Vulnerability Cyber Security News
How to Stay Ahead of Vulnerabilities Cyber Security News
SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are Cyber Security News
Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Digital Certificates
  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Digital Certificates
  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News