CVE-2024-34750: CWE-755 Improper Handling of Exceptional Conditions in Apache Software Foundation Apache Tomcat
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
AI Analysis
Technical Summary
CVE-2024-34750 is a vulnerability classified under CWE-755 (Improper Handling of Exceptional Conditions) and CWE-400 (Uncontrolled Resource Consumption) affecting Apache Tomcat versions from 8.5.0 through 11.0.0-M20. The root cause lies in Tomcat's HTTP/2 stream processing logic, where excessive HTTP headers cause the server to miscount the number of active HTTP/2 streams. This miscount leads to the assignment of an incorrect infinite timeout value for certain connections that should otherwise be closed. Consequently, these connections remain open indefinitely, consuming server resources such as memory and file descriptors. This behavior can be exploited remotely without authentication or user interaction, making it a network-exploitable denial-of-service (DoS) vector. The vulnerability affects multiple major Tomcat branches, including versions 8.5.x, 9.0.x, 10.1.x, and 11.0.x pre-release milestones. The issue was publicly disclosed on July 3, 2024, with no known active exploits reported at the time. The Apache Software Foundation has released fixed versions 11.0.0-M21, 10.1.25, and 9.0.90 that correct the stream counting and timeout logic. Organizations using affected Tomcat versions should upgrade promptly to mitigate the risk of resource exhaustion and potential service outages. Monitoring for abnormal HTTP/2 connection persistence and resource utilization is also recommended as a detection measure.
Potential Impact
The primary impact of CVE-2024-34750 is on the availability of services hosted on Apache Tomcat servers. By exploiting the improper handling of HTTP/2 streams, an attacker can cause connections to remain open indefinitely, leading to uncontrolled resource consumption such as memory, CPU, and network sockets. This can degrade server performance, exhaust system resources, and ultimately cause denial of service, disrupting web applications and services. For European organizations, this can translate into significant operational downtime, loss of customer trust, and potential regulatory scrutiny if critical services are affected. Public sector entities, financial institutions, and large enterprises that rely heavily on Tomcat for web hosting and application delivery are particularly vulnerable. Given the widespread use of Apache Tomcat across Europe, the threat could impact a broad range of industries. Additionally, prolonged resource exhaustion may increase the risk of cascading failures in interconnected systems. Although confidentiality and integrity are not directly impacted, the availability disruption can have severe business consequences.
Mitigation Recommendations
1. Immediate upgrade to the fixed Apache Tomcat versions: 11.0.0-M21, 10.1.25, or 9.0.90, depending on the version branch in use. 2. Implement network-level rate limiting and filtering to restrict excessive HTTP/2 header usage and abnormal connection persistence. 3. Monitor server metrics closely for unusual spikes in open connections, memory usage, and CPU load that may indicate exploitation attempts. 4. Configure HTTP/2 settings to enforce stricter limits on header sizes and stream counts where possible. 5. Employ Web Application Firewalls (WAFs) capable of detecting and blocking malformed or excessive HTTP/2 requests. 6. Conduct regular vulnerability assessments and penetration testing focusing on HTTP/2 protocol handling. 7. For legacy or EOL Tomcat versions that cannot be immediately upgraded, consider isolating these servers behind reverse proxies that can enforce connection timeouts and header limits. 8. Maintain up-to-date incident response plans to quickly address potential DoS incidents stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-34750: CWE-755 Improper Handling of Exceptional Conditions in Apache Software Foundation Apache Tomcat
Description
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-34750 is a vulnerability classified under CWE-755 (Improper Handling of Exceptional Conditions) and CWE-400 (Uncontrolled Resource Consumption) affecting Apache Tomcat versions from 8.5.0 through 11.0.0-M20. The root cause lies in Tomcat's HTTP/2 stream processing logic, where excessive HTTP headers cause the server to miscount the number of active HTTP/2 streams. This miscount leads to the assignment of an incorrect infinite timeout value for certain connections that should otherwise be closed. Consequently, these connections remain open indefinitely, consuming server resources such as memory and file descriptors. This behavior can be exploited remotely without authentication or user interaction, making it a network-exploitable denial-of-service (DoS) vector. The vulnerability affects multiple major Tomcat branches, including versions 8.5.x, 9.0.x, 10.1.x, and 11.0.x pre-release milestones. The issue was publicly disclosed on July 3, 2024, with no known active exploits reported at the time. The Apache Software Foundation has released fixed versions 11.0.0-M21, 10.1.25, and 9.0.90 that correct the stream counting and timeout logic. Organizations using affected Tomcat versions should upgrade promptly to mitigate the risk of resource exhaustion and potential service outages. Monitoring for abnormal HTTP/2 connection persistence and resource utilization is also recommended as a detection measure.
Potential Impact
The primary impact of CVE-2024-34750 is on the availability of services hosted on Apache Tomcat servers. By exploiting the improper handling of HTTP/2 streams, an attacker can cause connections to remain open indefinitely, leading to uncontrolled resource consumption such as memory, CPU, and network sockets. This can degrade server performance, exhaust system resources, and ultimately cause denial of service, disrupting web applications and services. For European organizations, this can translate into significant operational downtime, loss of customer trust, and potential regulatory scrutiny if critical services are affected. Public sector entities, financial institutions, and large enterprises that rely heavily on Tomcat for web hosting and application delivery are particularly vulnerable. Given the widespread use of Apache Tomcat across Europe, the threat could impact a broad range of industries. Additionally, prolonged resource exhaustion may increase the risk of cascading failures in interconnected systems. Although confidentiality and integrity are not directly impacted, the availability disruption can have severe business consequences.
Mitigation Recommendations
1. Immediate upgrade to the fixed Apache Tomcat versions: 11.0.0-M21, 10.1.25, or 9.0.90, depending on the version branch in use. 2. Implement network-level rate limiting and filtering to restrict excessive HTTP/2 header usage and abnormal connection persistence. 3. Monitor server metrics closely for unusual spikes in open connections, memory usage, and CPU load that may indicate exploitation attempts. 4. Configure HTTP/2 settings to enforce stricter limits on header sizes and stream counts where possible. 5. Employ Web Application Firewalls (WAFs) capable of detecting and blocking malformed or excessive HTTP/2 requests. 6. Conduct regular vulnerability assessments and penetration testing focusing on HTTP/2 protocol handling. 7. For legacy or EOL Tomcat versions that cannot be immediately upgraded, consider isolating these servers behind reverse proxies that can enforce connection timeouts and header limits. 8. Maintain up-to-date incident response plans to quickly address potential DoS incidents stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2024-05-08T07:23:16.760Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690204553aaa02566521b55f
Added to database: 10/29/2025, 12:11:01 PM
Last enriched: 11/6/2025, 1:57:18 AM
Last updated: 12/13/2025, 9:52:22 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14587: SQL Injection in itsourcecode Online Pet Shop Management System
MediumCVE-2025-9856: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in popupbuilder Popup Builder – Create highly converting, mobile friendly marketing popups.
MediumCVE-2025-8780: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livemesh Livemesh SiteOrigin Widgets
MediumCVE-2025-8687: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themelooks Enter Addons – Ultimate Template Builder for Elementor
MediumCVE-2025-8199: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in debuggersstudio Marquee Addons for Elementor – Advanced Elements & Modern Motion Widgets
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.