CVE-2024-23672: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Tomcat
Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
AI Analysis
Technical Summary
CVE-2024-23672 is a vulnerability classified under CWE-459 (Incomplete Cleanup) affecting multiple versions of Apache Tomcat, a widely used Java-based web server and servlet container. The issue stems from improper cleanup of WebSocket connections, which allows malicious or misbehaving WebSocket clients to keep connections open indefinitely. This behavior leads to increased resource consumption on the server, such as memory and file descriptors, potentially resulting in denial of service (DoS) conditions where legitimate users cannot access services. The affected versions span from early milestone releases (M1) to recent stable releases across Tomcat 8.5.x, 9.0.x, 10.1.x, and 11.0.x branches. Exploitation requires network access and low privileges but no user interaction, making it relatively easy to attempt. The CVSS v3.1 base score is 6.3 (medium), reflecting the moderate impact on availability and limited impact on confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a risk in environments heavily utilizing WebSocket connections. The Apache Software Foundation has addressed the issue in newer releases (8.5.99, 9.0.86, 10.1.19, 11.0.0-M17), and users are strongly advised to upgrade. The vulnerability is particularly relevant for applications relying on real-time communication via WebSockets, common in modern web applications and services.
Potential Impact
For European organizations, the primary impact of CVE-2024-23672 is the risk of denial of service due to resource exhaustion caused by persistent WebSocket connections. This can disrupt critical web applications, customer-facing portals, and internal services that depend on Apache Tomcat, leading to downtime and potential loss of business continuity. Organizations in sectors such as finance, government, telecommunications, and e-commerce, which often deploy Tomcat-based applications, may face operational disruptions. The vulnerability could also increase operational costs due to the need for emergency incident response and potential reputational damage if services become unavailable. While confidentiality and integrity impacts are low, the availability impact can be significant, especially if exploited at scale or combined with other attack vectors. Given the widespread use of Tomcat in Europe, unpatched systems represent a notable risk vector for service outages.
Mitigation Recommendations
To mitigate CVE-2024-23672, organizations should: 1) Immediately upgrade Apache Tomcat to the fixed versions 8.5.99, 9.0.86, 10.1.19, or 11.0.0-M17 as appropriate. 2) Implement WebSocket connection limits and timeouts at the application or server level to prevent clients from holding connections indefinitely. 3) Monitor WebSocket traffic patterns and resource utilization to detect abnormal connection persistence or spikes indicative of attempted exploitation. 4) Employ network-level controls such as rate limiting and connection throttling on firewalls or load balancers to mitigate potential abuse. 5) Review and harden server configurations to ensure resource cleanup mechanisms are effective. 6) Conduct regular vulnerability assessments and penetration testing focused on WebSocket implementations. 7) Educate development and operations teams about the risks associated with WebSocket misuse and the importance of timely patching. These steps go beyond generic advice by focusing on WebSocket-specific controls and proactive monitoring tailored to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-23672: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Tomcat
Description
Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-23672 is a vulnerability classified under CWE-459 (Incomplete Cleanup) affecting multiple versions of Apache Tomcat, a widely used Java-based web server and servlet container. The issue stems from improper cleanup of WebSocket connections, which allows malicious or misbehaving WebSocket clients to keep connections open indefinitely. This behavior leads to increased resource consumption on the server, such as memory and file descriptors, potentially resulting in denial of service (DoS) conditions where legitimate users cannot access services. The affected versions span from early milestone releases (M1) to recent stable releases across Tomcat 8.5.x, 9.0.x, 10.1.x, and 11.0.x branches. Exploitation requires network access and low privileges but no user interaction, making it relatively easy to attempt. The CVSS v3.1 base score is 6.3 (medium), reflecting the moderate impact on availability and limited impact on confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a risk in environments heavily utilizing WebSocket connections. The Apache Software Foundation has addressed the issue in newer releases (8.5.99, 9.0.86, 10.1.19, 11.0.0-M17), and users are strongly advised to upgrade. The vulnerability is particularly relevant for applications relying on real-time communication via WebSockets, common in modern web applications and services.
Potential Impact
For European organizations, the primary impact of CVE-2024-23672 is the risk of denial of service due to resource exhaustion caused by persistent WebSocket connections. This can disrupt critical web applications, customer-facing portals, and internal services that depend on Apache Tomcat, leading to downtime and potential loss of business continuity. Organizations in sectors such as finance, government, telecommunications, and e-commerce, which often deploy Tomcat-based applications, may face operational disruptions. The vulnerability could also increase operational costs due to the need for emergency incident response and potential reputational damage if services become unavailable. While confidentiality and integrity impacts are low, the availability impact can be significant, especially if exploited at scale or combined with other attack vectors. Given the widespread use of Tomcat in Europe, unpatched systems represent a notable risk vector for service outages.
Mitigation Recommendations
To mitigate CVE-2024-23672, organizations should: 1) Immediately upgrade Apache Tomcat to the fixed versions 8.5.99, 9.0.86, 10.1.19, or 11.0.0-M17 as appropriate. 2) Implement WebSocket connection limits and timeouts at the application or server level to prevent clients from holding connections indefinitely. 3) Monitor WebSocket traffic patterns and resource utilization to detect abnormal connection persistence or spikes indicative of attempted exploitation. 4) Employ network-level controls such as rate limiting and connection throttling on firewalls or load balancers to mitigate potential abuse. 5) Review and harden server configurations to ensure resource cleanup mechanisms are effective. 6) Conduct regular vulnerability assessments and penetration testing focused on WebSocket implementations. 7) Educate development and operations teams about the risks associated with WebSocket misuse and the importance of timely patching. These steps go beyond generic advice by focusing on WebSocket-specific controls and proactive monitoring tailored to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2024-01-19T11:44:18.348Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690204523aaa02566521b4fa
Added to database: 10/29/2025, 12:10:58 PM
Last enriched: 10/29/2025, 12:21:48 PM
Last updated: 10/30/2025, 1:34:43 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighMajor US Telecom Backbone Firm Hacked by Nation-State Actors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.