Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-28165: CWE-400 in The Eclipse Foundation Eclipse Jetty

0
High
VulnerabilityCVE-2021-28165cvecve-2021-28165cwe-400cwe-551
Published: Thu Apr 01 2021 (04/01/2021, 14:20:14 UTC)
Source: CVE
Vendor/Project: The Eclipse Foundation
Product: Eclipse Jetty

Description

In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.

AI-Powered Analysis

AILast updated: 06/25/2025, 17:07:57 UTC

Technical Analysis

CVE-2021-28165 is a high-severity vulnerability affecting multiple versions of Eclipse Jetty, specifically versions 7.2.2 through 9.4.38, 10.0.0.alpha0 through 10.0.1, and 11.0.0.alpha0 through 11.0.1. Eclipse Jetty is a widely used open-source Java-based HTTP server and servlet container often embedded in applications and services to provide web server capabilities. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-551 (Resource Exhaustion). The core issue arises when the server receives a large invalid TLS (Transport Layer Security) frame. Processing such a malformed TLS frame causes the Jetty server's CPU usage to spike to 100%, effectively leading to a denial-of-service (DoS) condition by exhausting CPU resources. This vulnerability does not require any authentication or user interaction, and can be exploited remotely over the network (CVSS vector AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise. Although no known exploits have been reported in the wild, the ease of exploitation and the potential for service disruption make this a significant risk for systems relying on vulnerable Jetty versions for secure communications. No official patches are linked in the provided data, but upgrading to fixed versions or applying vendor-provided mitigations is implied. The vulnerability affects TLS handling, a critical component for secure web communications, making it a concern for any service exposing Jetty-based TLS endpoints to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on Eclipse Jetty in their web infrastructure, embedded devices, or middleware solutions. A successful exploitation can lead to denial-of-service conditions, causing service outages or degraded performance. This can disrupt business operations, customer-facing services, and internal applications, potentially leading to financial losses and reputational damage. Critical sectors such as finance, healthcare, telecommunications, and government services that depend on Jetty for secure web services are particularly at risk. The vulnerability's exploitation does not compromise data confidentiality or integrity directly, but the resulting downtime could indirectly affect data availability and operational continuity. Additionally, the increased CPU usage could cause cascading failures in virtualized or cloud environments, impacting other co-hosted services. Given the remote and unauthenticated nature of the exploit, attackers can launch DoS attacks without prior access, increasing the threat surface. European organizations with stringent uptime and availability requirements must prioritize addressing this vulnerability to maintain compliance and service reliability.

Mitigation Recommendations

1. Immediate upgrade: Organizations should upgrade Eclipse Jetty to versions beyond 9.4.38, 10.0.1, and 11.0.1 where this vulnerability is resolved. If official patches are unavailable, consider upgrading to the latest stable release that addresses TLS frame handling. 2. Network-level protections: Deploy rate limiting and deep packet inspection on network devices to detect and block malformed TLS frames or anomalous traffic patterns targeting Jetty servers. 3. TLS termination offloading: Use dedicated TLS termination proxies or load balancers that can filter and validate TLS traffic before it reaches Jetty, reducing exposure to malformed frames. 4. Resource monitoring and alerting: Implement real-time CPU and resource usage monitoring with alerting thresholds to detect unusual spikes indicative of exploitation attempts. 5. Segmentation and isolation: Isolate Jetty servers in dedicated network segments with strict access controls to limit attack vectors and lateral movement. 6. Incident response readiness: Prepare and test DoS mitigation strategies, including traffic filtering and failover mechanisms, to quickly respond to potential exploitation. 7. Vendor engagement: Engage with Eclipse Foundation or Jetty maintainers for official patches or guidance and subscribe to security advisories for timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
eclipse
Date Reserved
2021-03-12T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed076

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 5:07:57 PM

Last updated: 2/7/2026, 5:46:12 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats