CVE-2024-38286: CWE-770 Allocation of Resources Without Limits or Throttling in Apache Software Foundation Apache Tomcat
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.
AI Analysis
Technical Summary
CVE-2024-38286 is a resource allocation vulnerability classified under CWE-770, found in Apache Tomcat versions ranging from 7.0.92 through 11.0.0-M20, including some end-of-life versions. The flaw arises from the lack of limits or throttling during the TLS handshake process, which can be abused by an unauthenticated remote attacker to trigger an OutOfMemoryError. This occurs because the server allocates resources excessively without proper controls, leading to exhaustion of memory and denial of service. The vulnerability is network exploitable (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), with a scope change (S:C) indicating the impact extends beyond the vulnerable component. The CVSS v3.1 score is 8.6, reflecting high severity due to the potential for complete service disruption. The issue affects multiple supported and EOL versions, emphasizing the need for patching or upgrading to fixed versions 11.0.0-M21, 10.1.25, or 9.0.90. While no exploits have been observed in the wild, the vulnerability's characteristics make it a credible threat for denial-of-service attacks, especially in environments with high TLS traffic. The vulnerability impacts availability (A:H) without compromising confidentiality or integrity, making it a critical concern for service continuity in web applications relying on Tomcat.
Potential Impact
For European organizations, this vulnerability poses a significant risk to service availability, particularly for those relying on Apache Tomcat for web application hosting, middleware, or enterprise services. An attacker can remotely trigger resource exhaustion, causing server crashes or degraded performance, leading to denial-of-service conditions. This can disrupt critical business operations, customer-facing services, and internal applications. Sectors such as finance, government, healthcare, and telecommunications, which often use Tomcat in their infrastructure, may experience operational downtime and reputational damage. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation attempts. Organizations with high TLS traffic volumes are especially vulnerable, as the attack vector exploits the TLS handshake process. The impact extends to cloud-hosted services and on-premises deployments alike, affecting both public-facing and internal systems.
Mitigation Recommendations
European organizations should immediately assess their Apache Tomcat deployments to identify affected versions. The primary mitigation is to upgrade to the fixed versions 11.0.0-M21, 10.1.25, or 9.0.90 as recommended by Apache. For environments where immediate upgrading is not feasible, organizations should implement network-level protections such as rate limiting TLS handshake requests, deploying Web Application Firewalls (WAFs) with custom rules to detect and block abnormal TLS handshake patterns, and monitoring for unusual memory usage or service crashes. Additionally, configuring JVM memory limits and enabling garbage collection tuning may help mitigate the impact. Organizations should also review TLS configuration to ensure no unnecessary protocols or cipher suites are enabled that could increase handshake complexity. Regularly updating and patching infrastructure components, combined with proactive monitoring and incident response readiness, will reduce the risk and impact of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-38286: CWE-770 Allocation of Resources Without Limits or Throttling in Apache Software Foundation Apache Tomcat
Description
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.
AI-Powered Analysis
Technical Analysis
CVE-2024-38286 is a resource allocation vulnerability classified under CWE-770, found in Apache Tomcat versions ranging from 7.0.92 through 11.0.0-M20, including some end-of-life versions. The flaw arises from the lack of limits or throttling during the TLS handshake process, which can be abused by an unauthenticated remote attacker to trigger an OutOfMemoryError. This occurs because the server allocates resources excessively without proper controls, leading to exhaustion of memory and denial of service. The vulnerability is network exploitable (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), with a scope change (S:C) indicating the impact extends beyond the vulnerable component. The CVSS v3.1 score is 8.6, reflecting high severity due to the potential for complete service disruption. The issue affects multiple supported and EOL versions, emphasizing the need for patching or upgrading to fixed versions 11.0.0-M21, 10.1.25, or 9.0.90. While no exploits have been observed in the wild, the vulnerability's characteristics make it a credible threat for denial-of-service attacks, especially in environments with high TLS traffic. The vulnerability impacts availability (A:H) without compromising confidentiality or integrity, making it a critical concern for service continuity in web applications relying on Tomcat.
Potential Impact
For European organizations, this vulnerability poses a significant risk to service availability, particularly for those relying on Apache Tomcat for web application hosting, middleware, or enterprise services. An attacker can remotely trigger resource exhaustion, causing server crashes or degraded performance, leading to denial-of-service conditions. This can disrupt critical business operations, customer-facing services, and internal applications. Sectors such as finance, government, healthcare, and telecommunications, which often use Tomcat in their infrastructure, may experience operational downtime and reputational damage. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation attempts. Organizations with high TLS traffic volumes are especially vulnerable, as the attack vector exploits the TLS handshake process. The impact extends to cloud-hosted services and on-premises deployments alike, affecting both public-facing and internal systems.
Mitigation Recommendations
European organizations should immediately assess their Apache Tomcat deployments to identify affected versions. The primary mitigation is to upgrade to the fixed versions 11.0.0-M21, 10.1.25, or 9.0.90 as recommended by Apache. For environments where immediate upgrading is not feasible, organizations should implement network-level protections such as rate limiting TLS handshake requests, deploying Web Application Firewalls (WAFs) with custom rules to detect and block abnormal TLS handshake patterns, and monitoring for unusual memory usage or service crashes. Additionally, configuring JVM memory limits and enabling garbage collection tuning may help mitigate the impact. Organizations should also review TLS configuration to ensure no unnecessary protocols or cipher suites are enabled that could increase handshake complexity. Regularly updating and patching infrastructure components, combined with proactive monitoring and incident response readiness, will reduce the risk and impact of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2024-06-12T16:27:23.740Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690204553aaa02566521b563
Added to database: 10/29/2025, 12:11:01 PM
Last enriched: 10/29/2025, 12:20:36 PM
Last updated: 10/30/2025, 4:03:45 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.