Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24549: CWE-20 Improper Input Validation in Apache Software Foundation Apache Tomcat

0
High
VulnerabilityCVE-2024-24549cvecve-2024-24549cwe-20
Published: Wed Mar 13 2024 (03/13/2024, 15:46:53 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.

AI-Powered Analysis

AILast updated: 10/29/2025, 12:21:04 UTC

Technical Analysis

CVE-2024-24549 is a vulnerability classified under CWE-20 (Improper Input Validation) found in the Apache Software Foundation's Apache Tomcat server software. The issue specifically affects the HTTP/2 protocol handling in Tomcat versions from 8.5.0 through 8.5.98, 9.0.0-M1 through 9.0.85, 10.1.0-M1 through 10.1.18, and 11.0.0-M1 through 11.0.0-M16. The vulnerability occurs because when processing HTTP/2 requests, if the request headers exceed any configured limits, the HTTP/2 stream associated with that request is not reset immediately after detecting the limit breach. Instead, the stream reset is delayed until all headers have been processed, which can cause the server to hold resources unnecessarily. This behavior can be exploited by an attacker sending specially crafted HTTP/2 requests with excessive headers to trigger resource exhaustion, leading to a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, no required privileges or user interaction, and the high impact on availability. The issue has been addressed in patched versions 11.0.0-M17, 10.1.19, 9.0.86, and 8.5.99. No public exploits have been reported yet, but the vulnerability is straightforward to exploit remotely, making it a significant threat to affected systems.

Potential Impact

For European organizations, the primary impact of CVE-2024-24549 is the potential for denial of service attacks against web applications and services running on vulnerable Apache Tomcat servers. This can lead to service outages, degraded performance, and disruption of business operations, especially for public-facing services relying on HTTP/2. Critical infrastructure, government portals, financial institutions, and large enterprises using Tomcat as part of their web stack are at risk of operational disruption. The vulnerability does not expose sensitive data but can cause significant availability issues, potentially affecting customer trust and compliance with service-level agreements. Given the widespread use of Apache Tomcat in Europe, the risk is substantial, particularly in sectors with high reliance on web services and cloud deployments. The lack of required authentication or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation attempts.

Mitigation Recommendations

European organizations should prioritize upgrading Apache Tomcat to the fixed versions: 11.0.0-M17, 10.1.19, 9.0.86, or 8.5.99, depending on their current deployment. In addition to patching, organizations should: 1) Review and tighten HTTP/2 header size and count limits to reasonable thresholds to reduce attack surface. 2) Implement network-level protections such as rate limiting and web application firewalls (WAFs) configured to detect and block abnormal HTTP/2 header patterns. 3) Monitor server logs and network traffic for unusual spikes in HTTP/2 requests or header anomalies indicative of exploitation attempts. 4) Employ redundancy and load balancing to mitigate potential DoS impacts. 5) Conduct regular vulnerability scans and penetration tests focusing on HTTP/2 handling. 6) Ensure incident response plans include procedures for DoS scenarios involving web servers. These steps, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2024-01-25T12:05:42.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690204533aaa02566521b502

Added to database: 10/29/2025, 12:10:59 PM

Last enriched: 10/29/2025, 12:21:04 PM

Last updated: 10/30/2025, 10:18:15 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats