Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack

Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack

Posted on August 14, 2025August 14, 2025 By CWS

A vital safety vulnerability in Apache Tomcat’s HTTP/2 implementation has been found, enabling attackers to launch devastating denial-of-service (DoS) assaults towards internet servers. 

The vulnerability, designated as CVE-2025-48989 and dubbed the “Made You Reset” assault, impacts a number of variations of the favored Java servlet container and poses important dangers to internet functions worldwide.

The safety flaw, rated as Excessive severity, impacts Apache Tomcat variations 11.0.0-M1 by means of 11.0.9, 10.1.0-M1 by means of 10.1.43, and 9.0.0.M1 by means of 9.0.107. 

Key Takeaways1. Apache Tomcat’s HTTP/2 flaw permits attackers to crash servers.2. Impacts Tomcat variations 9.0.0-11.0.9, doubtlessly impacting 1000’s of internet servers globally.3. Instantly improve to forestall exploitation.

Older end-of-life variations might also be susceptible, doubtlessly affecting 1000’s of internet servers globally. 

The vulnerability was recognized by safety researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel from Tel Aviv College, who disclosed their findings on August 13, 2025.

Exploiting HTTP/2 in Apache Tomcat 

The “Made You Reset” assault exploits weaknesses in Tomcat’s HTTP/2 protocol implementation, particularly focusing on the connection reset mechanism. 

When efficiently executed, the assault usually manifests as an OutOfMemoryError, inflicting the focused server to exhaust its out there reminiscence sources and grow to be unresponsive to respectable requests.

The vulnerability lies in how Tomcat handles HTTP/2 stream resets and connection administration. Attackers can craft malicious HTTP/2 requests that pressure the server to allocate extreme reminiscence sources with out correctly releasing them. 

This reminiscence leak conduct might be triggered repeatedly, finally overwhelming the server’s out there reminiscence pool and triggering a denial-of-service situation.

The assault vector leverages the HTTP/2 multiplexing function, the place a number of streams might be processed concurrently over a single TCP connection. 

By manipulating stream reset frames and connection state administration, attackers can pressure Tomcat to keep up quite a few half-open connections or incomplete stream states, resulting in useful resource exhaustion.

Threat FactorsDetailsAffected Merchandise– Apache Tomcat 11.0.0-M1 to 11.0.9- Apache Tomcat 10.1.0-M1 to 10.1.43- Apache Tomcat 9.0.0.M1 to 9.0.107- Older EOL variations (doubtlessly affected)ImpactDenial of Service (DoS) attackExploit Stipulations– HTTP/2 protocol enabled on course server- Community entry to ship malicious HTTP/2 requests- Potential to craft HTTP/2 stream reset frames- No authentication requiredSeverityHigh

Mitigations 

The Apache Software program Basis has launched patched variations to handle this vital vulnerability. Organizations operating affected Tomcat variations ought to instantly improve to Apache Tomcat 11.0.10, 10.1.44, or 9.0.108 or later variations. 

These updates embrace fixes for the HTTP/2 implementation that forestall the “Made You Reset” assault vector.

System directors ought to prioritize these updates, notably for public-facing internet functions that settle for HTTP/2 connections. 

The vulnerability’s Excessive severity score signifies that profitable exploitation might considerably impression service availability and enterprise operations.

Safety groups also needs to monitor their Tomcat installations for uncommon reminiscence consumption patterns and implement extra network-level protections, corresponding to price limiting and connection throttling, to mitigate potential assaults whereas patches are being deployed throughout their infrastructure.

Increase your SOC and assist your crew shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Apache, Attack, Attackers, DoS, Tomcat, Trigger, Vulnerabilities

Post navigation

Previous Post: Adobe’s August 2025 Patch Tuesday
Next Post: Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Related Posts

Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
Node.js-Powered LTX Stealer Targets User Credentials Node.js-Powered LTX Stealer Targets User Credentials Cyber Security News
10 Best Secure Network As a Service for MSP Providers 10 Best Secure Network As a Service for MSP Providers Cyber Security News
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Cyber Security News
Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark