CVE-2021-43980: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Apache Software Foundation Apache Tomcat
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.
AI Analysis
Technical Summary
CVE-2021-43980 is a concurrency vulnerability classified under CWE-362 (Race Condition) affecting multiple versions of Apache Tomcat, a widely used open-source Java Servlet container. The flaw arises from a simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 and later. This implementation exposed a long-standing but difficult-to-trigger concurrency bug present in Tomcat versions 8.5.0 through 8.5.77, 9.0.0-M1 through 9.0.60, 10.0.0-M1 through 10.0.18, and 10.1.0-M1 through 10.1.0-M12. The vulnerability occurs when client connections improperly share an Http11Processor instance due to improper synchronization. This can result in responses or partial responses being sent to the wrong client, potentially leaking data between users. The issue is rooted in improper synchronization of shared resources during concurrent execution, leading to race conditions. Although the vulnerability is challenging to exploit due to its concurrency nature and timing requirements, it can cause confidentiality breaches by exposing response data to unintended clients. The CVSS v3.1 base score is 3.7 (low severity), reflecting the network attack vector but high attack complexity and no privileges or user interaction required. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though it is expected that Apache has addressed this in later releases. The flaw does not impact integrity or availability but poses a risk to confidentiality in multi-tenant or shared hosting environments where Tomcat serves multiple clients concurrently.
Potential Impact
For European organizations, this vulnerability poses a confidentiality risk, especially for those running vulnerable versions of Apache Tomcat in environments hosting multiple clients or services. Misrouting HTTP responses could lead to unauthorized data disclosure between clients, violating data protection regulations such as the GDPR. Organizations in sectors handling sensitive personal data—such as finance, healthcare, and public services—may face compliance and reputational risks if data leakage occurs. Although the exploit complexity is high, the widespread use of Apache Tomcat in Europe means many organizations could be affected if they have not updated to patched versions. The impact is more pronounced in shared hosting or cloud environments where multiple tenants rely on the same Tomcat instance. However, the low CVSS score and lack of known exploits suggest the immediate risk is limited, but the potential for data leakage warrants attention.
Mitigation Recommendations
Organizations should promptly identify and upgrade all Apache Tomcat instances to versions beyond those affected (i.e., versions later than 8.5.77, 9.0.60, 10.0.18, and 10.1.0-M12). Since no patch links are provided, consulting the official Apache Tomcat security advisories and release notes is critical to apply the appropriate fixes. Additionally, administrators should review and harden Tomcat configurations to minimize shared resource usage and isolate client connections where possible. Implementing strict network segmentation and access controls can reduce exposure. For environments where immediate upgrade is not feasible, consider deploying web application firewalls (WAFs) to monitor and block anomalous traffic patterns that might trigger concurrency issues. Regular concurrency and load testing can help detect abnormal behavior. Finally, ensure logging and monitoring are enabled to detect any unusual response patterns indicative of this vulnerability being exploited.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2021-43980: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Apache Software Foundation Apache Tomcat
Description
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.
AI-Powered Analysis
Technical Analysis
CVE-2021-43980 is a concurrency vulnerability classified under CWE-362 (Race Condition) affecting multiple versions of Apache Tomcat, a widely used open-source Java Servlet container. The flaw arises from a simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 and later. This implementation exposed a long-standing but difficult-to-trigger concurrency bug present in Tomcat versions 8.5.0 through 8.5.77, 9.0.0-M1 through 9.0.60, 10.0.0-M1 through 10.0.18, and 10.1.0-M1 through 10.1.0-M12. The vulnerability occurs when client connections improperly share an Http11Processor instance due to improper synchronization. This can result in responses or partial responses being sent to the wrong client, potentially leaking data between users. The issue is rooted in improper synchronization of shared resources during concurrent execution, leading to race conditions. Although the vulnerability is challenging to exploit due to its concurrency nature and timing requirements, it can cause confidentiality breaches by exposing response data to unintended clients. The CVSS v3.1 base score is 3.7 (low severity), reflecting the network attack vector but high attack complexity and no privileges or user interaction required. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though it is expected that Apache has addressed this in later releases. The flaw does not impact integrity or availability but poses a risk to confidentiality in multi-tenant or shared hosting environments where Tomcat serves multiple clients concurrently.
Potential Impact
For European organizations, this vulnerability poses a confidentiality risk, especially for those running vulnerable versions of Apache Tomcat in environments hosting multiple clients or services. Misrouting HTTP responses could lead to unauthorized data disclosure between clients, violating data protection regulations such as the GDPR. Organizations in sectors handling sensitive personal data—such as finance, healthcare, and public services—may face compliance and reputational risks if data leakage occurs. Although the exploit complexity is high, the widespread use of Apache Tomcat in Europe means many organizations could be affected if they have not updated to patched versions. The impact is more pronounced in shared hosting or cloud environments where multiple tenants rely on the same Tomcat instance. However, the low CVSS score and lack of known exploits suggest the immediate risk is limited, but the potential for data leakage warrants attention.
Mitigation Recommendations
Organizations should promptly identify and upgrade all Apache Tomcat instances to versions beyond those affected (i.e., versions later than 8.5.77, 9.0.60, 10.0.18, and 10.1.0-M12). Since no patch links are provided, consulting the official Apache Tomcat security advisories and release notes is critical to apply the appropriate fixes. Additionally, administrators should review and harden Tomcat configurations to minimize shared resource usage and isolate client connections where possible. Implementing strict network segmentation and access controls can reduce exposure. For environments where immediate upgrade is not feasible, consider deploying web application firewalls (WAFs) to monitor and block anomalous traffic patterns that might trigger concurrency issues. Regular concurrency and load testing can help detect abnormal behavior. Finally, ensure logging and monitoring are enabled to detect any unusual response patterns indicative of this vulnerability being exploited.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2021-11-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dec48c4522896dcc00a6e
Added to database: 5/21/2025, 3:07:52 PM
Last enriched: 7/7/2025, 2:43:29 PM
Last updated: 8/8/2025, 2:16:22 PM
Views: 14
Related Threats
CVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.