CVE-2025-48989: CWE-404 Improper Resource Shutdown or Release in Apache Software Foundation Apache Tomcat
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
AI Analysis
Technical Summary
CVE-2025-48989 is a vulnerability categorized as CWE-404 (Improper Resource Shutdown or Release) found in the Apache Tomcat server, a widely used open-source Java servlet container. The flaw exists in versions 9.0.0.M1 through 9.0.107, 10.1.0-M1 through 10.1.43, and 11.0.0-M1 through 11.0.9. It allows an unauthenticated remote attacker to exploit improper handling of resource shutdown within the server, leading to a denial of service (DoS) condition. Specifically, the vulnerability arises when Tomcat fails to correctly release or shut down resources such as threads, connections, or internal objects during certain operations, which can be manipulated to exhaust server resources. The CVSS v3.1 score of 7.5 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no direct confidentiality or integrity compromise. The vulnerability is known as the 'made you reset' attack, implying forced resets or crashes of the Tomcat service. No public exploits have been reported yet, but the widespread use of Tomcat in enterprise and web environments makes this a significant risk. The Apache Software Foundation has released patched versions 9.0.108, 10.1.44, and 11.0.10 to address the issue, and users are urged to upgrade immediately. The vulnerability affects both current and some older EOL versions, emphasizing the need for timely patch management. Given Tomcat's role in hosting critical web applications, exploitation could disrupt business operations and service availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-48989 is the potential for denial of service attacks against web servers and applications running on Apache Tomcat. This can lead to unavailability of critical services, affecting sectors such as finance, government, healthcare, and e-commerce that rely heavily on Tomcat-based infrastructure. Disruptions could result in operational downtime, loss of customer trust, and financial losses. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely; however, service outages can indirectly impact business continuity and compliance with service-level agreements (SLAs). The ease of exploitation without authentication or user interaction increases the risk of widespread attacks, especially in environments exposed to the internet. European organizations with limited patch management capabilities or those running outdated Tomcat versions are at higher risk. Additionally, denial of service attacks could be leveraged as part of larger multi-vector campaigns targeting critical infrastructure or government services, exacerbating the impact.
Mitigation Recommendations
1. Immediately upgrade Apache Tomcat to the fixed versions 9.0.108, 10.1.44, or 11.0.10 as recommended by the Apache Software Foundation. 2. Conduct an inventory of all Tomcat instances across the organization, including development, testing, and production environments, to ensure no vulnerable versions remain in use. 3. Implement network-level protections such as Web Application Firewalls (WAFs) and Intrusion Detection/Prevention Systems (IDS/IPS) to monitor and block anomalous traffic patterns that could trigger resource exhaustion. 4. Monitor server resource utilization (CPU, memory, thread counts) closely to detect early signs of exploitation attempts or abnormal shutdowns. 5. Enforce strict access controls and segmentation to limit exposure of Tomcat servers to untrusted networks, reducing the attack surface. 6. Review and harden Tomcat configuration settings to minimize unnecessary resource consumption and improve resilience against DoS conditions. 7. Establish incident response procedures specifically for service outages related to Tomcat to enable rapid recovery and mitigation. 8. Regularly update and patch all software dependencies and underlying operating systems to reduce the risk of chained exploits.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-48989: CWE-404 Improper Resource Shutdown or Release in Apache Software Foundation Apache Tomcat
Description
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-48989 is a vulnerability categorized as CWE-404 (Improper Resource Shutdown or Release) found in the Apache Tomcat server, a widely used open-source Java servlet container. The flaw exists in versions 9.0.0.M1 through 9.0.107, 10.1.0-M1 through 10.1.43, and 11.0.0-M1 through 11.0.9. It allows an unauthenticated remote attacker to exploit improper handling of resource shutdown within the server, leading to a denial of service (DoS) condition. Specifically, the vulnerability arises when Tomcat fails to correctly release or shut down resources such as threads, connections, or internal objects during certain operations, which can be manipulated to exhaust server resources. The CVSS v3.1 score of 7.5 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no direct confidentiality or integrity compromise. The vulnerability is known as the 'made you reset' attack, implying forced resets or crashes of the Tomcat service. No public exploits have been reported yet, but the widespread use of Tomcat in enterprise and web environments makes this a significant risk. The Apache Software Foundation has released patched versions 9.0.108, 10.1.44, and 11.0.10 to address the issue, and users are urged to upgrade immediately. The vulnerability affects both current and some older EOL versions, emphasizing the need for timely patch management. Given Tomcat's role in hosting critical web applications, exploitation could disrupt business operations and service availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-48989 is the potential for denial of service attacks against web servers and applications running on Apache Tomcat. This can lead to unavailability of critical services, affecting sectors such as finance, government, healthcare, and e-commerce that rely heavily on Tomcat-based infrastructure. Disruptions could result in operational downtime, loss of customer trust, and financial losses. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely; however, service outages can indirectly impact business continuity and compliance with service-level agreements (SLAs). The ease of exploitation without authentication or user interaction increases the risk of widespread attacks, especially in environments exposed to the internet. European organizations with limited patch management capabilities or those running outdated Tomcat versions are at higher risk. Additionally, denial of service attacks could be leveraged as part of larger multi-vector campaigns targeting critical infrastructure or government services, exacerbating the impact.
Mitigation Recommendations
1. Immediately upgrade Apache Tomcat to the fixed versions 9.0.108, 10.1.44, or 11.0.10 as recommended by the Apache Software Foundation. 2. Conduct an inventory of all Tomcat instances across the organization, including development, testing, and production environments, to ensure no vulnerable versions remain in use. 3. Implement network-level protections such as Web Application Firewalls (WAFs) and Intrusion Detection/Prevention Systems (IDS/IPS) to monitor and block anomalous traffic patterns that could trigger resource exhaustion. 4. Monitor server resource utilization (CPU, memory, thread counts) closely to detect early signs of exploitation attempts or abnormal shutdowns. 5. Enforce strict access controls and segmentation to limit exposure of Tomcat servers to untrusted networks, reducing the attack surface. 6. Review and harden Tomcat configuration settings to minimize unnecessary resource consumption and improve resilience against DoS conditions. 7. Establish incident response procedures specifically for service outages related to Tomcat to enable rapid recovery and mitigation. 8. Regularly update and patch all software dependencies and underlying operating systems to reduce the risk of chained exploits.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-05-29T15:25:37.243Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 689c826dad5a09ad00415599
Added to database: 8/13/2025, 12:17:49 PM
Last enriched: 11/5/2025, 3:47:01 PM
Last updated: 11/13/2025, 2:01:30 AM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13076: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-13075: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-64707: CWE-863: Incorrect Authorization in frappe lms
LowCVE-2025-64705: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in frappe lms
LowCVE-2025-64517: CWE-287: Improper Authentication in trifectatechfoundation sudo-rs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.