CVE-2025-48989

7.5 HIGH

📋 TL;DR

This CVE describes an Improper Resource Shutdown or Release vulnerability in Apache Tomcat that enables a 'made you reset' attack. Attackers can exploit this to cause resource exhaustion or service disruption. Affected users include anyone running vulnerable versions of Apache Tomcat.

💻 Affected Systems

Products:
  • Apache Tomcat
Versions: 11.0.0-M1 through 11.0.9, 10.1.0-M1 through 10.1.43, 9.0.0.M1 through 9.0.107
Operating Systems: All operating systems running Tomcat
Default Config Vulnerable: ⚠️ Yes
Notes: Older EOL versions may also be affected. All configurations using vulnerable versions are at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service through resource exhaustion, potentially causing application downtime and service unavailability.

🟠

Likely Case

Service degradation or intermittent availability issues due to resource exhaustion attacks.

🟢

If Mitigated

Minimal impact with proper resource monitoring and rate limiting in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability appears to be exploitable without authentication based on the description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.10, 10.1.44, or 9.0.108

Vendor Advisory: https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf

Restart Required: Yes

Instructions:

1. Download the patched version from Apache Tomcat website. 2. Stop the Tomcat service. 3. Backup current installation. 4. Replace with patched version. 5. Restart Tomcat service.

🔧 Temporary Workarounds

Rate Limiting

all

Implement connection rate limiting to prevent resource exhaustion attacks

# Configure in server.xml: <Connector ... maxConnections="100" acceptCount="50" />

Resource Monitoring

linux

Monitor Tomcat resource usage and implement alerts for abnormal patterns

# Monitor with: ps aux | grep tomcat
# Check connections: netstat -an | grep :8080 | wc -l

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Tomcat instances
  • Deploy web application firewalls (WAF) with rate limiting and DoS protection rules

🔍 How to Verify

Check if Vulnerable:

Check Tomcat version by examining the server startup logs or version.txt file in the Tomcat installation directory

Check Version:

grep 'Server version' $CATALINA_HOME/logs/catalina.out | head -1

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions (11.0.10, 10.1.44, or 9.0.108)

📡 Detection & Monitoring

Log Indicators:

  • Unusual connection patterns
  • Resource exhaustion warnings
  • Multiple connection resets

Network Indicators:

  • Abnormal number of TCP connections to Tomcat ports
  • Connection reset patterns

SIEM Query:

source="tomcat" AND ("connection reset" OR "resource exhausted" OR "max connections")

🔗 References

📤 Share & Export