Skip to main content

CVE-2021-43980: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Apache Software Foundation Apache Tomcat

Low
VulnerabilityCVE-2021-43980cvecve-2021-43980cwe-362
Published: Wed Sep 28 2022 (09/28/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:43:29 UTC

Technical Analysis

CVE-2021-43980 is a concurrency vulnerability classified under CWE-362 (Race Condition) affecting multiple versions of Apache Tomcat, a widely used open-source Java Servlet container. The flaw arises from a simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 and later. This implementation exposed a long-standing but difficult-to-trigger concurrency bug present in Tomcat versions 8.5.0 through 8.5.77, 9.0.0-M1 through 9.0.60, 10.0.0-M1 through 10.0.18, and 10.1.0-M1 through 10.1.0-M12. The vulnerability occurs when client connections improperly share an Http11Processor instance due to improper synchronization. This can result in responses or partial responses being sent to the wrong client, potentially leaking data between users. The issue is rooted in improper synchronization of shared resources during concurrent execution, leading to race conditions. Although the vulnerability is challenging to exploit due to its concurrency nature and timing requirements, it can cause confidentiality breaches by exposing response data to unintended clients. The CVSS v3.1 base score is 3.7 (low severity), reflecting the network attack vector but high attack complexity and no privileges or user interaction required. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though it is expected that Apache has addressed this in later releases. The flaw does not impact integrity or availability but poses a risk to confidentiality in multi-tenant or shared hosting environments where Tomcat serves multiple clients concurrently.

Potential Impact

For European organizations, this vulnerability poses a confidentiality risk, especially for those running vulnerable versions of Apache Tomcat in environments hosting multiple clients or services. Misrouting HTTP responses could lead to unauthorized data disclosure between clients, violating data protection regulations such as the GDPR. Organizations in sectors handling sensitive personal data—such as finance, healthcare, and public services—may face compliance and reputational risks if data leakage occurs. Although the exploit complexity is high, the widespread use of Apache Tomcat in Europe means many organizations could be affected if they have not updated to patched versions. The impact is more pronounced in shared hosting or cloud environments where multiple tenants rely on the same Tomcat instance. However, the low CVSS score and lack of known exploits suggest the immediate risk is limited, but the potential for data leakage warrants attention.

Mitigation Recommendations

Organizations should promptly identify and upgrade all Apache Tomcat instances to versions beyond those affected (i.e., versions later than 8.5.77, 9.0.60, 10.0.18, and 10.1.0-M12). Since no patch links are provided, consulting the official Apache Tomcat security advisories and release notes is critical to apply the appropriate fixes. Additionally, administrators should review and harden Tomcat configurations to minimize shared resource usage and isolate client connections where possible. Implementing strict network segmentation and access controls can reduce exposure. For environments where immediate upgrade is not feasible, consider deploying web application firewalls (WAFs) to monitor and block anomalous traffic patterns that might trigger concurrency issues. Regular concurrency and load testing can help detect abnormal behavior. Finally, ensure logging and monitoring are enabled to detect any unusual response patterns indicative of this vulnerability being exploited.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2021-11-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dec48c4522896dcc00a6e

Added to database: 5/21/2025, 3:07:52 PM

Last enriched: 7/7/2025, 2:43:29 PM

Last updated: 8/8/2025, 2:16:22 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats