Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53506: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat

0
High
VulnerabilityCVE-2025-53506cvecve-2025-53506cwe-400
Published: Thu Jul 10 2025 (07/10/2025, 19:14:23 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.

AI-Powered Analysis

AILast updated: 11/05/2025, 15:48:29 UTC

Technical Analysis

CVE-2025-53506 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting multiple versions of Apache Tomcat, a widely used Java-based web server and servlet container. The flaw arises in the HTTP/2 protocol handling within Tomcat, specifically when an HTTP/2 client does not acknowledge the initial settings frame that sets the maximum number of concurrent streams allowed. This failure prevents Tomcat from properly limiting concurrent streams, enabling a malicious client to open excessive streams and consume server resources uncontrollably. This can lead to denial-of-service (DoS) conditions by exhausting CPU, memory, or other resources, thereby degrading or halting legitimate service availability. The vulnerability affects Tomcat versions from 8.5.0 through 8.5.100, 9.0.0.M1 through 9.0.106, 10.1.0-M1 through 10.1.42, and 11.0.0-M1 through 11.0.8, including some end-of-life versions. The issue is exploitable remotely without any authentication or user interaction, increasing its risk profile. The Apache Software Foundation has addressed this vulnerability in versions 11.0.9, 10.1.43, and 9.0.107. No public exploits have been reported yet, but the nature of the flaw makes it a potential vector for DoS attacks against critical web infrastructure relying on Tomcat. The CVSS v3.1 score of 7.5 reflects a high severity, emphasizing the impact on availability with no confidentiality or integrity loss. Organizations using affected Tomcat versions should prioritize upgrading to the patched releases to mitigate this risk.

Potential Impact

The primary impact of CVE-2025-53506 is on the availability of web services hosted on Apache Tomcat servers. An attacker can exploit this vulnerability to cause a denial-of-service by exhausting server resources through uncontrolled concurrent HTTP/2 streams. For European organizations, this can disrupt critical business applications, customer-facing portals, and internal services that rely on Tomcat, leading to operational downtime and potential financial losses. Sectors such as finance, government, healthcare, and e-commerce, which often use Tomcat for their web infrastructure, are particularly vulnerable. Additionally, prolonged service outages can damage organizational reputation and erode customer trust. Since the vulnerability requires no authentication or user interaction, it can be exploited by remote attackers with minimal effort, increasing the threat landscape. The lack of confidentiality or integrity impact means data breaches are unlikely, but service disruption alone can have severe consequences, especially for time-sensitive or critical services.

Mitigation Recommendations

To mitigate CVE-2025-53506, organizations should immediately upgrade Apache Tomcat to the fixed versions 11.0.9, 10.1.43, or 9.0.107 depending on their current deployment. If immediate upgrade is not feasible, administrators should consider temporarily disabling HTTP/2 support to prevent exploitation, though this may impact performance. Network-level mitigations such as rate limiting and connection throttling on HTTP/2 traffic can reduce the risk of resource exhaustion. Monitoring server resource usage and HTTP/2 connection metrics can help detect anomalous activity indicative of exploitation attempts. Implementing Web Application Firewalls (WAFs) with HTTP/2 anomaly detection capabilities may provide additional protection. Regularly reviewing and updating incident response plans to include DoS scenarios related to HTTP/2 is recommended. Finally, organizations should maintain an inventory of Tomcat versions in use and ensure timely patch management processes are in place to address future vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-07-01T14:22:04.137Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687014fca83201eaaca97a0e

Added to database: 7/10/2025, 7:31:08 PM

Last enriched: 11/5/2025, 3:48:29 PM

Last updated: 11/21/2025, 11:55:12 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats