CVE-2025-53506: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
AI Analysis
Technical Summary
CVE-2025-53506 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting multiple versions of Apache Tomcat, a widely used Java-based web server and servlet container. The flaw arises in the HTTP/2 protocol handling within Tomcat, specifically when an HTTP/2 client does not acknowledge the initial settings frame that sets the maximum number of concurrent streams allowed. This failure prevents Tomcat from properly limiting concurrent streams, enabling a malicious client to open excessive streams and consume server resources uncontrollably. This can lead to denial-of-service (DoS) conditions by exhausting CPU, memory, or other resources, thereby degrading or halting legitimate service availability. The vulnerability affects Tomcat versions from 8.5.0 through 8.5.100, 9.0.0.M1 through 9.0.106, 10.1.0-M1 through 10.1.42, and 11.0.0-M1 through 11.0.8, including some end-of-life versions. The issue is exploitable remotely without any authentication or user interaction, increasing its risk profile. The Apache Software Foundation has addressed this vulnerability in versions 11.0.9, 10.1.43, and 9.0.107. No public exploits have been reported yet, but the nature of the flaw makes it a potential vector for DoS attacks against critical web infrastructure relying on Tomcat. The CVSS v3.1 score of 7.5 reflects a high severity, emphasizing the impact on availability with no confidentiality or integrity loss. Organizations using affected Tomcat versions should prioritize upgrading to the patched releases to mitigate this risk.
Potential Impact
The primary impact of CVE-2025-53506 is on the availability of web services hosted on Apache Tomcat servers. An attacker can exploit this vulnerability to cause a denial-of-service by exhausting server resources through uncontrolled concurrent HTTP/2 streams. For European organizations, this can disrupt critical business applications, customer-facing portals, and internal services that rely on Tomcat, leading to operational downtime and potential financial losses. Sectors such as finance, government, healthcare, and e-commerce, which often use Tomcat for their web infrastructure, are particularly vulnerable. Additionally, prolonged service outages can damage organizational reputation and erode customer trust. Since the vulnerability requires no authentication or user interaction, it can be exploited by remote attackers with minimal effort, increasing the threat landscape. The lack of confidentiality or integrity impact means data breaches are unlikely, but service disruption alone can have severe consequences, especially for time-sensitive or critical services.
Mitigation Recommendations
To mitigate CVE-2025-53506, organizations should immediately upgrade Apache Tomcat to the fixed versions 11.0.9, 10.1.43, or 9.0.107 depending on their current deployment. If immediate upgrade is not feasible, administrators should consider temporarily disabling HTTP/2 support to prevent exploitation, though this may impact performance. Network-level mitigations such as rate limiting and connection throttling on HTTP/2 traffic can reduce the risk of resource exhaustion. Monitoring server resource usage and HTTP/2 connection metrics can help detect anomalous activity indicative of exploitation attempts. Implementing Web Application Firewalls (WAFs) with HTTP/2 anomaly detection capabilities may provide additional protection. Regularly reviewing and updating incident response plans to include DoS scenarios related to HTTP/2 is recommended. Finally, organizations should maintain an inventory of Tomcat versions in use and ensure timely patch management processes are in place to address future vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-53506: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
Description
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-53506 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting multiple versions of Apache Tomcat, a widely used Java-based web server and servlet container. The flaw arises in the HTTP/2 protocol handling within Tomcat, specifically when an HTTP/2 client does not acknowledge the initial settings frame that sets the maximum number of concurrent streams allowed. This failure prevents Tomcat from properly limiting concurrent streams, enabling a malicious client to open excessive streams and consume server resources uncontrollably. This can lead to denial-of-service (DoS) conditions by exhausting CPU, memory, or other resources, thereby degrading or halting legitimate service availability. The vulnerability affects Tomcat versions from 8.5.0 through 8.5.100, 9.0.0.M1 through 9.0.106, 10.1.0-M1 through 10.1.42, and 11.0.0-M1 through 11.0.8, including some end-of-life versions. The issue is exploitable remotely without any authentication or user interaction, increasing its risk profile. The Apache Software Foundation has addressed this vulnerability in versions 11.0.9, 10.1.43, and 9.0.107. No public exploits have been reported yet, but the nature of the flaw makes it a potential vector for DoS attacks against critical web infrastructure relying on Tomcat. The CVSS v3.1 score of 7.5 reflects a high severity, emphasizing the impact on availability with no confidentiality or integrity loss. Organizations using affected Tomcat versions should prioritize upgrading to the patched releases to mitigate this risk.
Potential Impact
The primary impact of CVE-2025-53506 is on the availability of web services hosted on Apache Tomcat servers. An attacker can exploit this vulnerability to cause a denial-of-service by exhausting server resources through uncontrolled concurrent HTTP/2 streams. For European organizations, this can disrupt critical business applications, customer-facing portals, and internal services that rely on Tomcat, leading to operational downtime and potential financial losses. Sectors such as finance, government, healthcare, and e-commerce, which often use Tomcat for their web infrastructure, are particularly vulnerable. Additionally, prolonged service outages can damage organizational reputation and erode customer trust. Since the vulnerability requires no authentication or user interaction, it can be exploited by remote attackers with minimal effort, increasing the threat landscape. The lack of confidentiality or integrity impact means data breaches are unlikely, but service disruption alone can have severe consequences, especially for time-sensitive or critical services.
Mitigation Recommendations
To mitigate CVE-2025-53506, organizations should immediately upgrade Apache Tomcat to the fixed versions 11.0.9, 10.1.43, or 9.0.107 depending on their current deployment. If immediate upgrade is not feasible, administrators should consider temporarily disabling HTTP/2 support to prevent exploitation, though this may impact performance. Network-level mitigations such as rate limiting and connection throttling on HTTP/2 traffic can reduce the risk of resource exhaustion. Monitoring server resource usage and HTTP/2 connection metrics can help detect anomalous activity indicative of exploitation attempts. Implementing Web Application Firewalls (WAFs) with HTTP/2 anomaly detection capabilities may provide additional protection. Regularly reviewing and updating incident response plans to include DoS scenarios related to HTTP/2 is recommended. Finally, organizations should maintain an inventory of Tomcat versions in use and ensure timely patch management processes are in place to address future vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-07-01T14:22:04.137Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687014fca83201eaaca97a0e
Added to database: 7/10/2025, 7:31:08 PM
Last enriched: 11/5/2025, 3:48:29 PM
Last updated: 11/21/2025, 11:55:12 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13138: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in listingthemes WP Directory Kit
HighCVE-2025-12964: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nalam-1 Magical Products Display – Elementor WooCommerce Widgets | Product Sliders, Grids & AJAX Search
MediumCVE-2025-12750: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in trainingbusinesspros Groundhogg — CRM, Newsletters, and Marketing Automation
MediumCVE-2025-12160: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nmedia Simple User Registration
HighCVE-2025-12066: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in etruel WP Delete Post Copies
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.