Apache Software Foundation

Apache Software Foundation

A critical **CVE-2025-48989** vulnerability, dubbed *‘Made You Reset’*, was discovered in **Apache Tomcat’s HTTP/2 implementation**, enabling attackers to execute **devastating denial-of-service (DoS) attacks** by exploiting memory exhaustion flaws. The flaw affects **Tomcat versions 9.0.0–11.0.9**, risking crashes in thousands of global web servers. Attackers manipulate **HTTP/2 stream resets**, forcing servers into an *OutOfMemoryError* state, rendering them unresponsive. The vulnerability requires **no authentication**, only network access to send malicious requests. While patches (Tomcat **11.0.10, 10.1.44, 9.0.108+**) were released, unpatched systems remain exposed to **service outages, financial losses from downtime, and reputational damage**. Older end-of-life versions may also be vulnerable, amplifying risks for organizations relying on legacy infrastructure. The attack leverages **HTTP/2 multiplexing** to overwhelm memory pools, disrupting business-critical applications. Mitigations include **urgent upgrades, rate limiting, and monitoring for abnormal memory spikes** to prevent exploitation.

Source: https://cybersecuritynews.com/apache-tomcat-dos-vulnerabilities-2/

TPRM report: https://www.rankiteo.com/company/the-apache-software-foundation

"id": "the738081425",
"linkid": "the-apache-software-foundation",
"type": "Vulnerability",
"date": "8/2025",
"severity": "50",
"impact": "2",
"explanation": "Attack limited on finance or reputation"
{'affected_entities': [{'customers_affected': ['Organizations Using Apache '
                                               'Tomcat (Potentially Thousands '
                                               'of Web Servers)'],
                        'industry': 'Software Development',
                        'location': 'Global',
                        'name': 'Apache Software Foundation',
                        'type': 'Open-Source Organization'}],
 'attack_vector': ['Network',
                   'HTTP/2 Protocol Manipulation',
                   'Stream Reset Frames'],
 'customer_advisories': ['Organizations Using Apache Tomcat Urged to Apply '
                         'Patches',
                         'Public-Facing Web Applications Prioritized for '
                         'Updates'],
 'date_publicly_disclosed': '2025-08-13',
 'description': 'A critical security vulnerability in Apache Tomcat’s HTTP/2 '
                "implementation (CVE-2025-48989, dubbed 'Made You Reset') "
                'enables attackers to launch devastating denial-of-service '
                '(DoS) attacks by exploiting weaknesses in the connection '
                'reset mechanism. The flaw causes servers to exhaust memory '
                'resources, leading to OutOfMemoryError and unresponsiveness. '
                'It affects Apache Tomcat versions 11.0.0-M1 through 11.0.9, '
                '10.1.0-M1 through 10.1.43, and 9.0.0.M1 through 9.0.107, '
                'along with potentially vulnerable older end-of-life (EOL) '
                'versions. The attack leverages HTTP/2 multiplexing to '
                'manipulate stream reset frames, forcing the server to '
                'maintain half-open connections and deplete memory.',
 'impact': {'brand_reputation_impact': ['Potential Loss of Trust in Affected '
                                        'Services',
                                        'Negative Publicity for Organizations '
                                        'Using Vulnerable Versions'],
            'downtime': ['Potential Extended Outages Due to OutOfMemoryError',
                         'Service Unavailability for Legitimate Users'],
            'operational_impact': ['Disruption of Web Services',
                                   'Degraded Performance',
                                   'Resource Exhaustion'],
            'systems_affected': ['Apache Tomcat Servers (Versions 9.0.0-M1 to '
                                 '11.0.9)',
                                 'Web Applications Relying on Affected Tomcat '
                                 'Instances']},
 'investigation_status': 'Disclosed; Patches Released',
 'lessons_learned': ['Importance of Timely Patching for Critical '
                     'Vulnerabilities in Widely Used Software',
                     'Need for Robust Memory Management in HTTP/2 '
                     'Implementations',
                     'Value of Network-Level Mitigations (e.g., Rate Limiting) '
                     'During Patch Deployment'],
 'post_incident_analysis': {'corrective_actions': ['Patched HTTP/2 '
                                                   'Implementation in Tomcat '
                                                   'Versions 11.0.10, 10.1.44, '
                                                   'and 9.0.108',
                                                   'Enhanced Memory Management '
                                                   'for Connection States',
                                                   'Improved Handling of '
                                                   'Stream Reset Frames'],
                            'root_causes': ['Flaw in HTTP/2 Stream Reset and '
                                            'Connection Management in Apache '
                                            'Tomcat',
                                            'Inadequate Memory Release '
                                            'Mechanisms for Half-Open '
                                            'Connections',
                                            'Lack of Input Validation for '
                                            'Malicious HTTP/2 Frames']},
 'recommendations': ['Upgrade to Patched Apache Tomcat Versions (11.0.10, '
                     '10.1.44, or 9.0.108+) Immediately',
                     'Disable HTTP/2 Protocol if Not Required for Operations',
                     'Implement Rate Limiting and Connection Throttling for '
                     'HTTP/2 Traffic',
                     'Monitor Server Memory Usage for Anomalies Indicative of '
                     'Exploitation',
                     'Conduct Regular Vulnerability Assessments for Web Server '
                     'Infrastructure'],
 'references': [{'source': 'Security Researchers (Tel Aviv University) - Gal '
                           'Bar Nahum, Anat Bremler-Barr, Yaniv Harel'},
                {'source': 'Apache Software Foundation Advisory'}],
 'response': {'communication_strategy': ['Public Disclosure by Security '
                                         'Researchers (Tel Aviv University)',
                                         'Advisories from Apache Software '
                                         'Foundation'],
              'containment_measures': ['Monitoring for Unusual Memory '
                                       'Consumption Patterns',
                                       'Network-Level Protections (Rate '
                                       'Limiting, Connection Throttling)'],
              'enhanced_monitoring': ['Monitoring for HTTP/2-Based Attacks',
                                      'Tracking Memory Usage Anomalies'],
              'remediation_measures': ['Immediate Upgrade to Patched Versions '
                                       '(Tomcat 11.0.10, 10.1.44, or '
                                       '9.0.108+)']},
 'stakeholder_advisories': ['Apache Software Foundation',
                            'Security Research Community',
                            'System Administrators of Affected Tomcat '
                            'Instances'],
 'title': "Apache Tomcat HTTP/2 'Made You Reset' Denial-of-Service "
          'Vulnerability (CVE-2025-48989)',
 'type': ['Vulnerability', 'Denial-of-Service (DoS)'],
 'vulnerability_exploited': "CVE-2025-48989 (HTTP/2 'Made You Reset' Memory "
                            'Exhaustion)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.