CVE-2025-31650: Apache Tomcat Flaw Allows Rule Bypass and Server Disruption

Share:

A high-severity vulnerability in Apache Tomcat—CVE-2025-31650—was disclosed by the Apache Software Foundation. The flaw allows attackers to bypass security rules and cause Denial of Service (DoS) by exploiting malformed HTTP Priority headers, leading to memory leaks and eventual OutOfMemoryException.

Severity Level: High

VULNERABILITY OVERVIEW:

  1. Vulnerability Details:
    • CVE ID: CVE-2025-31650
    • Type: Denial-of-Service (DoS) via Memory Leak
    • Component Affected: Apache Tomcat’s handling of HTTP/2 Priority headers
    • CVSS v3.1 score: High (exact score not given, likely 7.5–8.6 based on impact)
    • Affected Versions: Apache Tomcat versions – 9.0.76 to 9.0.102, 10.1.10 to 10.1.39, 11.0.0-M2 to 11.0.5
  2. Root Cause:
    • The vulnerability lies in the HTTP/2 Priority header parsing mechanism. Specifically:
    • Improper input validation of malformed or invalid Priority headers.
    • When Tomcat receives a malformed request, it attempts to parse the header.
    • Instead of rejecting and releasing all resources, Tomcat fails to clean up the request’s memory structures due to flawed error handling.
    • This causes a memory leak — memory allocated to the request is not freed.
    • Repetition of such requests eventually leads to heap exhaustion, triggering an OutOfMemoryException, resulting in server crash or hang (DoS).
  3. Exploitation of the Vulnerability:
    • Prerequisites:
      • No authentication required.
      • Server must be running an affected version of Apache Tomcat with HTTP/2 support.
    • Exploitation Steps:
      • Craft multiple HTTP/2 requests with deliberately malformed Priority headers.
      • Flood the server with these requests at high volume.
      • Tomcat tries to process them, fails error cleanup, and accumulates memory usage.
      • Eventually, the server hits a heap memory limit.
    • Results in:
      • OutOfMemoryException
      • Denial-of-Service (DoS) as the server becomes unresponsive.

Recommendations:

  1. Upgrade to Apache Tomcat 11.0.6 or later
  2. Upgrade to Apache Tomcat 10.1.40 or later
  3. Upgrade to Apache Tomcat 9.0.104 or later

Source:

  • https://cybersecuritynews.com/apache-tomcat-vulnerability-let-bypass-rules/
  • https://lists.apache.org/thread/y14yjrf40w2236hwjv7gmhs65csn42gj

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.