Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat

0
Medium
VulnerabilityCVE-2024-54677cvecve-2024-54677cwe-400
Published: Tue Dec 17 2024 (12/17/2024, 12:35:50 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.

AI-Powered Analysis

AILast updated: 10/29/2025, 12:21:22 UTC

Technical Analysis

CVE-2024-54677 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the examples web application included with Apache Tomcat, a widely used open-source Java Servlet container. The flaw exists in multiple versions of Tomcat, specifically from 8.5.0 through 8.5.100 (EOL), 9.0.0.M1 through 9.9.97, 10.1.0-M1 through 10.1.33, and 11.0.0-M1 through 11.0.1. The vulnerability allows an unauthenticated remote attacker to trigger excessive resource consumption, such as CPU or memory, by sending crafted requests to the vulnerable example application. This leads to denial of service (DoS) conditions, where legitimate users may be unable to access services hosted on the affected Tomcat server. The vulnerability does not impact confidentiality or integrity but affects availability. The CVSS v3.1 base score is 5.3, reflecting medium severity due to network attack vector, no privileges or user interaction required, and impact limited to availability. No known public exploits or active exploitation have been reported at the time of disclosure. The Apache Software Foundation has addressed the issue in Tomcat versions 11.0.2, 10.1.34, and 9.0.98. Users running affected versions are strongly recommended to upgrade to these patched releases to mitigate the risk. The vulnerability primarily resides in the example web application, which may be deployed by default or used for testing purposes, but if exposed in production environments, it can be leveraged to disrupt service availability.

Potential Impact

For European organizations, the primary impact of CVE-2024-54677 is the risk of denial of service attacks against web applications running on vulnerable Apache Tomcat servers. This can lead to service outages, degraded performance, and potential operational disruption, especially for critical infrastructure, government portals, financial services, and large enterprises that rely heavily on Tomcat for hosting Java-based web applications. The vulnerability does not compromise data confidentiality or integrity but can cause significant availability issues, potentially affecting business continuity and user trust. Organizations with publicly accessible Tomcat instances or those exposing the example web application are at higher risk. The medium severity score suggests moderate impact, but the ease of exploitation (no authentication or user interaction required) increases the threat level. In sectors such as healthcare, finance, and public administration across Europe, service availability is crucial, and disruptions could have cascading effects. Additionally, the presence of end-of-life versions in some environments may complicate mitigation efforts, increasing exposure. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

1. Immediate upgrade to Apache Tomcat versions 11.0.2, 10.1.34, or 9.0.98, which contain the fix for this vulnerability. 2. Audit all Tomcat deployments to identify if the example web application is enabled or exposed, and disable or remove it in production environments if not required. 3. Implement network-level protections such as web application firewalls (WAFs) to detect and block abnormal request patterns that could indicate resource exhaustion attempts. 4. Monitor server resource usage (CPU, memory, threads) closely to identify unusual spikes that may signal exploitation attempts. 5. Restrict access to management and example applications to trusted internal networks or via VPN to reduce exposure. 6. Regularly review and update patch management processes to ensure timely application of security updates, especially for widely used infrastructure components like Tomcat. 7. Consider deploying rate limiting and connection throttling to mitigate potential DoS attacks. 8. Educate system administrators about the risks of running example or demo applications in production and enforce secure deployment guidelines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2024-12-05T07:31:33.851Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690204553aaa02566521b57a

Added to database: 10/29/2025, 12:11:01 PM

Last enriched: 10/29/2025, 12:21:22 PM

Last updated: 10/30/2025, 5:28:57 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats