Apache Tomcat has addressed three important denial-of-service (DoS) vulnerabilities that might permit malicious actors to disrupt net purposes and providers.
These safety flaws, tracked as CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506, have an effect on all Apache Tomcat variations from 9.0.0.M1 to 9.0.106.
The vulnerabilities exploit completely different assault vectors, together with HTTP/2 protocol weaknesses, file add mechanisms, and stream dealing with capabilities.
Key Takeaways1. CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506 have an effect on Apache Tomcat 9.0.0.M1 to 9.0.106, permitting distant denial-of-service assaults.2. Exploits goal the HTTP/2 protocol with APR/Native, file add integer overflow, and extreme HTTP/2 stream creation.3. All vulnerabilities have been patched by way of particular commits implementing correct validation and useful resource limits.4. Speedy improve to model 9.0.107 is required as exploits want no authentication.
Organizations operating affected variations ought to instantly improve to Apache Tomcat 9.0.107 to mitigate these safety dangers and stop potential service disruptions.
HTTP/2 and APR/Native Flaw (CVE-2025-52434)
The primary vulnerability, CVE-2025-52434, represents a important flaw in Apache Tomcat’s HTTP/2 implementation when used with the APR/Native connector.
This vulnerability permits attackers to set off denial-of-service circumstances by exploiting weaknesses within the HTTP/2 protocol dealing with mechanisms.
The APR/Native connector, which gives enhanced efficiency by way of native library integration, turns into vulnerable to useful resource exhaustion assaults when processing malformed or extreme HTTP/2 requests.
The safety crew addressed this problem by way of commit 8a83c3c4, which implements correct validation and useful resource administration for HTTP/2 connections.
System directors using APR/Native connectors with HTTP/2 enabled ought to prioritize this replace, because the vulnerability could be exploited remotely with out authentication.
The repair introduces stricter boundary checks and connection lifecycle administration to forestall useful resource depletion situations.
Integer Overflow in File Uploads (CVE-2025-52520)
CVE-2025-52520 exploits integer overflow circumstances in Apache Tomcat’s file add processing mechanism.
Attackers can craft malicious multipart/form-data requests with specifically crafted Content material-Size headers that set off integer overflow vulnerabilities, doubtlessly bypassing file dimension restrictions and inflicting reminiscence exhaustion.
This vulnerability impacts purposes that deal with file uploads by way of servlet containers. The remediation, carried out in commit 927d66fb, introduces strong enter validation and correct integer bounds checking for file add operations.
The repair ensures that maxRequestSize and maxFileSize parameters are correctly validated earlier than processing, stopping overflow circumstances that might result in limitless reminiscence allocation.
Net purposes with file add performance ought to implement further validation layers on the utility stage as a defense-in-depth technique.
Extreme HTTP/2 Streams (CVE-2025-53506)
The third vulnerability, CVE-2025-53506, permits attackers to overwhelm Apache Tomcat servers by creating extreme HTTP/2 streams inside a single connection.
This assault vector exploits the HTTP/2 multiplexing function, the place a number of streams could be processed concurrently over a single TCP connection. Malicious purchasers can quickly create quite a few streams, exhausting server reminiscence and processing assets.
Commit 43477293 addresses this vulnerability by implementing correct stream rely limitations and useful resource administration insurance policies.
CVEsDescriptionSeverityCVE-2025-52434Denial-of-Service vulnerability in HTTP/2 implementation used with APR/Native connector.ImportantCVE-2025-52520Integer overflow vulnerability in file add dealing with mechanism.ImportantCVE-2025-53506Denial-of-Service by way of extreme HTTP/2 stream creation.Necessary
The repair introduces configurable parameters for max concurrent streams per connection and implements sleek degradation mechanisms when limits are approached.
Community directors ought to configure applicable values for maxConcurrentStreams and monitor HTTP/2 connection patterns to detect potential abuse.
Organizations operating affected Apache Tomcat variations ought to instantly improve to 9.0.107 and evaluation their safety configurations to mitigate these important vulnerabilities.
Assume like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now