CVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
AI Analysis
Technical Summary
CVE-2024-54677 is an uncontrolled resource consumption vulnerability categorized under CWE-400, found in the examples web application bundled with Apache Tomcat. This vulnerability allows an unauthenticated remote attacker to trigger excessive resource usage, such as CPU or memory exhaustion, leading to denial of service conditions. The affected versions span multiple major releases: from 8.5.0 through 8.5.100 (EOL), 9.0.0.M1 through 9.9.97, 10.1.0-M1 through 10.1.33, and 11.0.0-M1 through 11.0.1. The flaw resides specifically in the example web application, which is often deployed by default or used for testing and demonstration purposes. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The vulnerability does not impact confidentiality or integrity but can cause significant availability degradation by exhausting server resources, potentially crashing the Tomcat service or making it unresponsive. The Apache Software Foundation has addressed this issue in versions 11.0.2, 10.1.34, and 9.0.98, and users are strongly recommended to upgrade. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a credible threat, especially in environments where the example application is accessible. Organizations using older or EOL versions should consider upgrading or removing the example application to mitigate risk.
Potential Impact
For European organizations, the primary impact of CVE-2024-54677 is the risk of denial of service on systems running vulnerable Apache Tomcat versions. This can lead to service outages affecting web applications, internal tools, or customer-facing portals, potentially disrupting business operations and causing reputational damage. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on Java-based web infrastructure may experience operational interruptions. The vulnerability's ease of exploitation without authentication increases the risk of opportunistic attacks, especially if the example application is publicly accessible. While no direct data breach risk exists, the availability impact can indirectly affect confidentiality and integrity by preventing timely updates or incident response. Organizations with compliance obligations under GDPR must consider the operational risks and potential service-level agreement breaches arising from DoS incidents. The presence of EOL versions in some environments may exacerbate the risk due to lack of vendor support and delayed patching.
Mitigation Recommendations
1. Immediately upgrade Apache Tomcat to the fixed versions: 11.0.2, 10.1.34, or 9.0.98, depending on your deployment. 2. If upgrading is not immediately feasible, disable or remove the examples web application from the Tomcat server to eliminate the vulnerable component. 3. Restrict network access to the examples application by applying firewall rules or network segmentation to limit exposure to trusted internal users only. 4. Monitor server resource utilization and set alerts for unusual spikes in CPU, memory, or thread usage that could indicate exploitation attempts. 5. Implement rate limiting or web application firewall (WAF) rules to detect and block abnormal request patterns targeting the examples application. 6. Conduct regular vulnerability scans and penetration tests focusing on web application components to identify residual risks. 7. Maintain an inventory of Tomcat versions deployed across the organization and enforce patch management policies to prevent running EOL or vulnerable versions. 8. Educate development and operations teams about the risks of deploying example or demo applications in production environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
Description
Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2024-54677 is an uncontrolled resource consumption vulnerability categorized under CWE-400, found in the examples web application bundled with Apache Tomcat. This vulnerability allows an unauthenticated remote attacker to trigger excessive resource usage, such as CPU or memory exhaustion, leading to denial of service conditions. The affected versions span multiple major releases: from 8.5.0 through 8.5.100 (EOL), 9.0.0.M1 through 9.9.97, 10.1.0-M1 through 10.1.33, and 11.0.0-M1 through 11.0.1. The flaw resides specifically in the example web application, which is often deployed by default or used for testing and demonstration purposes. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The vulnerability does not impact confidentiality or integrity but can cause significant availability degradation by exhausting server resources, potentially crashing the Tomcat service or making it unresponsive. The Apache Software Foundation has addressed this issue in versions 11.0.2, 10.1.34, and 9.0.98, and users are strongly recommended to upgrade. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a credible threat, especially in environments where the example application is accessible. Organizations using older or EOL versions should consider upgrading or removing the example application to mitigate risk.
Potential Impact
For European organizations, the primary impact of CVE-2024-54677 is the risk of denial of service on systems running vulnerable Apache Tomcat versions. This can lead to service outages affecting web applications, internal tools, or customer-facing portals, potentially disrupting business operations and causing reputational damage. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on Java-based web infrastructure may experience operational interruptions. The vulnerability's ease of exploitation without authentication increases the risk of opportunistic attacks, especially if the example application is publicly accessible. While no direct data breach risk exists, the availability impact can indirectly affect confidentiality and integrity by preventing timely updates or incident response. Organizations with compliance obligations under GDPR must consider the operational risks and potential service-level agreement breaches arising from DoS incidents. The presence of EOL versions in some environments may exacerbate the risk due to lack of vendor support and delayed patching.
Mitigation Recommendations
1. Immediately upgrade Apache Tomcat to the fixed versions: 11.0.2, 10.1.34, or 9.0.98, depending on your deployment. 2. If upgrading is not immediately feasible, disable or remove the examples web application from the Tomcat server to eliminate the vulnerable component. 3. Restrict network access to the examples application by applying firewall rules or network segmentation to limit exposure to trusted internal users only. 4. Monitor server resource utilization and set alerts for unusual spikes in CPU, memory, or thread usage that could indicate exploitation attempts. 5. Implement rate limiting or web application firewall (WAF) rules to detect and block abnormal request patterns targeting the examples application. 6. Conduct regular vulnerability scans and penetration tests focusing on web application components to identify residual risks. 7. Maintain an inventory of Tomcat versions deployed across the organization and enforce patch management policies to prevent running EOL or vulnerable versions. 8. Educate development and operations teams about the risks of deploying example or demo applications in production environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2024-12-05T07:31:33.851Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690204553aaa02566521b57a
Added to database: 10/29/2025, 12:11:01 PM
Last enriched: 11/6/2025, 1:54:55 AM
Last updated: 12/15/2025, 3:02:35 PM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34412: CWE-693 Protection Mechanism Failure in EQS Group GmbH Convercent Whistleblowing Platform
MediumCVE-2025-34411: CWE-862 Missing Authorization in EQS Group GmbH Convercent Whistleblowing Platform
MediumCVE-2025-34181: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in NetSupport Software Manager
HighCVE-2025-34180: CWE-257 Storing Passwords in a Recoverable Format in NetSupport Software Manager
HighCVE-2025-34179: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in NetSupport Software Manager
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.