CVE-2025-66614

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to bypass client certificate authentication in Apache Tomcat when multiple virtual hosts are configured with different TLS authentication requirements. By sending mismatched host names in the SNI extension and HTTP host header, attackers can access protected resources without proper authentication. Only Tomcat installations with multiple virtual hosts and client certificate authentication configured at the Connector level are affected.

💻 Affected Systems

Products:
  • Apache Tomcat
Versions: 11.0.0-M1 through 11.0.14, 10.1.0-M1 through 10.1.49, 9.0.0-M1 through 9.0.112, 8.5.0 through 8.5.100 (EOL)
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured with multiple virtual hosts where client certificate authentication is required for some hosts but not others, and authentication is enforced at the Connector level.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized access to sensitive resources protected by client certificate authentication, potentially leading to data breaches or privilege escalation.

🟠

Likely Case

Authentication bypass allowing access to resources that should require client certificates, compromising security boundaries between virtual hosts.

🟢

If Mitigated

Limited impact if client certificate authentication is enforced at the web application level or if only single virtual host configurations are used.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires specific configuration conditions but is straightforward once those conditions are met.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.15+, 10.1.50+, 9.0.113+

Vendor Advisory: https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7

Restart Required: Yes

Instructions:

1. Download patched Tomcat version from Apache website. 2. Backup current installation. 3. Stop Tomcat service. 4. Replace Tomcat files with patched version. 5. Restart Tomcat service. 6. Verify version and functionality.

🔧 Temporary Workarounds

Enforce client certificate authentication at web application level

all

Configure client certificate authentication within web applications instead of at the Connector level

Use single virtual host configuration

all

Consolidate to a single virtual host or ensure all virtual hosts have identical client certificate requirements

🧯 If You Can't Patch

  • Configure all virtual hosts to require client certificate authentication uniformly
  • Implement additional authentication layers at the application level

🔍 How to Verify

Check if Vulnerable:

Check Tomcat version and configuration: 1. Verify Tomcat version is in affected range. 2. Check if multiple virtual hosts are configured. 3. Verify client certificate authentication is configured at Connector level with different requirements per host.

Check Version:

catalina.sh version (Unix) or catalina.bat version (Windows)

Verify Fix Applied:

1. Confirm Tomcat version is 11.0.15+, 10.1.50+, or 9.0.113+. 2. Test that mismatched SNI and HTTP host headers no longer bypass authentication.

📡 Detection & Monitoring

Log Indicators:

  • Multiple host names in single TLS session
  • Authentication failures followed by successful access with different host headers

Network Indicators:

  • Mismatched SNI and HTTP Host header values in TLS handshakes

SIEM Query:

Search for TLS connections with SNI host different from HTTP Host header, followed by successful authentication

🔗 References

📤 Share & Export