CVE-2024-24549
CVE-2024-24549 is a Denial of Service vulnerability in Apache Tomcat caused by improper input validation. This vulnerability allows attackers to potentially crash a Tomcat server by sending specially crafted HTTP/2 requests that exceed configured header limits. The vulnerability impacts Apache Tomcat versions 11.0.0-M1 through 11.0.0-M16, 10.1.0-M1 through 10.1.18, 9.0.0-M1 through 9.0.85, and 8.5.0 through 8.5.98. Although the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 42, indicating a moderate level of risk, especially considering the availability of active exploits. This means attackers are actively trying to leverage this flaw. Upgrade to Apache Tomcat versions 11.0.0-M17, 10.1.19, 9.0.86, or 8.5.99 to mitigate this risk and ensure service availability. The existence of exploit available makes patching urgent.
Description
CVE-2024-24549 is a Denial of Service vulnerability in Apache Tomcat due to improper input validation in HTTP/2 requests. This vulnerability allows an attacker to send a specially crafted HTTP/2 request that exceeds the configured header limits, causing the server to process the entire request before resetting the stream. This can lead to a denial of service condition.
Key Insights
- The SVRS of 30 indicates that this vulnerability is of moderate severity and requires attention.
- This vulnerability affects a wide range of Apache Tomcat versions, making it a potential target for attackers.
- The vulnerability is actively exploited in the wild, making it a critical threat to organizations using Apache Tomcat.
Mitigation Strategies
- Upgrade to Apache Tomcat version 11.0.0-M17, 10.1.19, 9.0.86, or 8.5.99, which fix the issue.
- Implement input validation mechanisms to prevent attackers from sending malformed HTTP/2 requests.
- Monitor network traffic for suspicious activity and block any attempts to exploit this vulnerability.
Additional Information
- Threat Actors/APT Groups: Not specified
- Exploit Status: Active exploits have been published
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
- In the Wild: Yes
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.