CVE-2026-41284: CWE-770 Allocation of Resources Without Limits or Throttling in Apache Software Foundation Apache Tomcat
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117. Older, unsupported versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
AI Analysis
Technical Summary
This vulnerability (CWE-770) in Apache Tomcat allows allocation of resources without proper limits or throttling, potentially enabling resource exhaustion conditions. It affects Apache Tomcat versions from 11.0.0-M1 through 11.0.21, 10.1.0-M1 through 10.1.54, and 9.0.0.M1 through 9.0.117, including some older unsupported versions. The advisory recommends upgrading to a fixed version, but no specific patch version or vendor advisory details are provided. No CVSS score or detailed impact metrics are available.
Potential Impact
The vulnerability could allow an attacker to cause resource exhaustion on affected Apache Tomcat servers by exploiting the lack of allocation limits or throttling. This may lead to denial of service conditions. There are no known exploits in the wild reported at this time.
Mitigation Recommendations
Users should upgrade Apache Tomcat to the fixed version once it is identified and released by the vendor. Since no official patch or remediation level is provided in the data, patch status is not yet confirmed — check the Apache Software Foundation advisory for current remediation guidance. No other mitigation recommendations are provided.
CVE-2026-41284: CWE-770 Allocation of Resources Without Limits or Throttling in Apache Software Foundation Apache Tomcat
Description
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117. Older, unsupported versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CWE-770) in Apache Tomcat allows allocation of resources without proper limits or throttling, potentially enabling resource exhaustion conditions. It affects Apache Tomcat versions from 11.0.0-M1 through 11.0.21, 10.1.0-M1 through 10.1.54, and 9.0.0.M1 through 9.0.117, including some older unsupported versions. The advisory recommends upgrading to a fixed version, but no specific patch version or vendor advisory details are provided. No CVSS score or detailed impact metrics are available.
Potential Impact
The vulnerability could allow an attacker to cause resource exhaustion on affected Apache Tomcat servers by exploiting the lack of allocation limits or throttling. This may lead to denial of service conditions. There are no known exploits in the wild reported at this time.
Mitigation Recommendations
Users should upgrade Apache Tomcat to the fixed version once it is identified and released by the vendor. Since no official patch or remediation level is provided in the data, patch status is not yet confirmed — check the Apache Software Foundation advisory for current remediation guidance. No other mitigation recommendations are provided.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2026-04-20T07:27:43.961Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a034c88cbff5d8610fea6e3
Added to database: 5/12/2026, 3:51:36 PM
Last enriched: 5/12/2026, 4:07:06 PM
Last updated: 5/12/2026, 9:05:17 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.