Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks

Posted on July 9, 2025July 9, 2025 By CWS

Apache Tomcat has addressed three important denial-of-service (DoS) vulnerabilities that might permit malicious actors to disrupt net purposes and providers. 

These safety flaws, tracked as CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506, have an effect on all Apache Tomcat variations from 9.0.0.M1 to 9.0.106. 

The vulnerabilities exploit completely different assault vectors, together with HTTP/2 protocol weaknesses, file add mechanisms, and stream dealing with capabilities. 

Key Takeaways1. CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506 have an effect on Apache Tomcat 9.0.0.M1 to 9.0.106, permitting distant denial-of-service assaults.2. Exploits goal the HTTP/2 protocol with APR/Native, file add integer overflow, and extreme HTTP/2 stream creation.3. All vulnerabilities have been patched by way of particular commits implementing correct validation and useful resource limits.4. Speedy improve to model 9.0.107 is required as exploits want no authentication.

Organizations operating affected variations ought to instantly improve to Apache Tomcat 9.0.107 to mitigate these safety dangers and stop potential service disruptions.

HTTP/2 and APR/Native Flaw (CVE-2025-52434)

The primary vulnerability, CVE-2025-52434, represents a important flaw in Apache Tomcat’s HTTP/2 implementation when used with the APR/Native connector. 

This vulnerability permits attackers to set off denial-of-service circumstances by exploiting weaknesses within the HTTP/2 protocol dealing with mechanisms. 

The APR/Native connector, which gives enhanced efficiency by way of native library integration, turns into vulnerable to useful resource exhaustion assaults when processing malformed or extreme HTTP/2 requests.

The safety crew addressed this problem by way of commit 8a83c3c4, which implements correct validation and useful resource administration for HTTP/2 connections. 

System directors using APR/Native connectors with HTTP/2 enabled ought to prioritize this replace, because the vulnerability could be exploited remotely with out authentication. 

The repair introduces stricter boundary checks and connection lifecycle administration to forestall useful resource depletion situations.

Integer Overflow in File Uploads (CVE-2025-52520)

CVE-2025-52520 exploits integer overflow circumstances in Apache Tomcat’s file add processing mechanism. 

Attackers can craft malicious multipart/form-data requests with specifically crafted Content material-Size headers that set off integer overflow vulnerabilities, doubtlessly bypassing file dimension restrictions and inflicting reminiscence exhaustion. 

This vulnerability impacts purposes that deal with file uploads by way of servlet containers. The remediation, carried out in commit 927d66fb, introduces strong enter validation and correct integer bounds checking for file add operations. 

The repair ensures that maxRequestSize and maxFileSize parameters are correctly validated earlier than processing, stopping overflow circumstances that might result in limitless reminiscence allocation. 

Net purposes with file add performance ought to implement further validation layers on the utility stage as a defense-in-depth technique.

Extreme HTTP/2 Streams (CVE-2025-53506)

The third vulnerability, CVE-2025-53506, permits attackers to overwhelm Apache Tomcat servers by creating extreme HTTP/2 streams inside a single connection. 

This assault vector exploits the HTTP/2 multiplexing function, the place a number of streams could be processed concurrently over a single TCP connection. Malicious purchasers can quickly create quite a few streams, exhausting server reminiscence and processing assets.

Commit 43477293 addresses this vulnerability by implementing correct stream rely limitations and useful resource administration insurance policies. 

CVEsDescriptionSeverityCVE-2025-52434Denial-of-Service vulnerability in HTTP/2 implementation used with APR/Native connector.ImportantCVE-2025-52520Integer overflow vulnerability in file add dealing with mechanism.ImportantCVE-2025-53506Denial-of-Service by way of extreme HTTP/2 stream creation.Necessary

The repair introduces configurable parameters for max concurrent streams per connection and implements sleek degradation mechanisms when limits are approached. 

Community directors ought to configure applicable values for maxConcurrentStreams and monitor HTTP/2 connection patterns to detect potential abuse.

Organizations operating affected Apache Tomcat variations ought to instantly improve to 9.0.107 and evaluation their safety configurations to mitigate these important vulnerabilities.

Assume like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now

Cyber Security News Tags:Apache, Attackers, Attacks, DoS, Multiple, Tomcat, Trigger, Vulnerabilities

Post navigation

Previous Post: Canadian Electric Utility Says Power Meters Disrupted by Cyberattack
Next Post: Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking

Related Posts

SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation Cyber Security News
Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Cyber Security News
Acer Control Center Vulnerability Let Attackers Execute Malicious Code as a Privileged User Cyber Security News
Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation Cyber Security News
Quantum Threats Preparing Your Encryption Strategy Cyber Security News
DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News