CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-38286

High Severity
SVRS
40/100

CVSSv3
NA/10

EPSS
0.00646/1

CVE-2024-38286: Apache Tomcat is vulnerable to resource allocation issues, potentially leading to an OutOfMemoryError. This vulnerability affects versions 11.0.0-M1 through 11.0.0-M20, 10.1.0-M1 through 10.1.24, and 9.0.13 through 9.0.89. The issue can be triggered via the TLS handshake process, allowing attackers to exhaust server resources. While the CVSS score is 0, indicating no immediate action is required, the SOCRadar Vulnerability Risk Score (SVRS) is 40, suggesting a moderate risk. Users should upgrade to versions 11.0.0-M21, 10.1.25, or 9.0.90 to mitigate this denial-of-service vulnerability. Failure to apply the security update may result in server instability or crashes.

In The Wild
2024-11-07

2024-11-08
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-38286 is a vulnerability with a CVSS score of 0, indicating a low severity level. However, SOCRadar's unique 'SOCRadar Vulnerability Risk Score' (SVRS) assigns it a score of 40, highlighting the potential for significant impact. This discrepancy stems from the SVRS's integration of various 'Vulnerability Intelligence' elements, including Social Media, News, Code Repositories, Dark/Deep Web data, and associations with Threat Actors and malware.

Key Insights

  • Active Exploitation: The vulnerability is actively exploited in the wild, posing an immediate threat to organizations.
  • Low CVSS Score: The CVSS score of 0 may underestimate the severity of the vulnerability, as it does not fully capture the potential impact identified by SOCRadar's SVRS.
  • Critical for Immediate Action: The SVRS score of 40 indicates that this vulnerability requires immediate attention and remediation to mitigate potential risks.
  • Threat Actors: Specific threat actors or groups actively exploiting this vulnerability have not been identified at this time.

Mitigation Strategies

  • Apply Software Updates: Install the latest software updates and patches as soon as they become available to address the vulnerability.
  • Enable Security Controls: Implement strong security controls, such as firewalls, intrusion detection systems, and anti-malware software, to prevent exploitation attempts.
  • Monitor Network Traffic: Monitor network traffic for suspicious activity and investigate any anomalies that may indicate an attack.
  • Educate Users: Train users on cybersecurity best practices, such as avoiding suspicious links and attachments, to reduce the risk of phishing attacks.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

1.818
2025-02-13
1.818 | Newly Added (7)Adobe Photoshop CVE-2025-21127 Privilege Escalation VulnerabilityAdobe Photoshop CVE-2025-21122 VulnerabilityApache Tomcat CVE-2024-38286 Denial of Service VulnerabilitySecurity Vulnerabilities fixed in Google Chrome
fortiguard.com
rss
forum
news
CVE-2024-38286 | Apache Tomcat up to 9.0.89/10.1.24/11.0.0-M20 TLS Handshake resource consumption (Nessus ID 208063)
vuldb.com2024-11-07
CVE-2024-38286 | Apache Tomcat up to 9.0.89/10.1.24/11.0.0-M20 TLS Handshake resource consumption (Nessus ID 208063) | A vulnerability was found in Apache Tomcat up to 9.0.89/10.1.24/11.0.0-M20. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component TLS Handshake Handler. The manipulation leads to resource consumption. This vulnerability is known as CVE-2024-38286. The attack can
vuldb.com
rss
forum
news
Tomcat EOL version with TomEE Plus
/u/Prior_Stock_44572024-09-28
Tomcat EOL version with TomEE Plus | I would like to know why Apache TomEE Plus 9.1.3 is shipping EOL Tomcat Version 10.0.27 ?? As per research i have done it shows new vulnerabilities are not tested against 10.0.x branch. The stable version of TomEE Plus is 9.1.3. TomEE Plus 10.x is a milestone version (if i'm not wrong Milestone stands for under development, please correct me if I'm wrong). The issue is recent vulnerability (CVE-2024-38286) is vulnerable
reddit.com
rss
forum
news
CVE-2024-38286: Apache Tomcat: Denial of Service
2024-09-23
CVE-2024-38286: Apache Tomcat: Denial of Service | Posted by Mark Thomas on Sep 23Affected versions: - Apache Tomcat 11.0.0-M1 through 11.0.0-M20 - Apache Tomcat 10.1.0-M1 through 10.1.24 - Apache Tomcat 9.0.13 through 9.0.89 Description: Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20,
cve-2024-38286
cves
apache
tomcat
Apache Tomcat Vulnerability Lets Attackers Trigger Dos Attack
Dhivya2024-09-24
Apache Tomcat Vulnerability Lets Attackers Trigger Dos Attack | A newly discovered vulnerability in Apache Tomcat, CVE-2024-38286, has raised significant concerns among cybersecurity experts. This flaw allows attackers to trigger a Denial of Service (DoS) attack by exploiting the TLS handshake process. The vulnerability, classified as “Important” in severity, affects several versions of Apache Tomcat. Here is a table summarizing the affected versions of […] The post Apache Tomcat Vulnerability Lets Attackers Trigger Dos Attack appeared
cybersecuritynews.com
rss
forum
news

Social Media

Apache Tomcat vulnerability lets Attackers trigger Dos Attack A newly discovered vulnerability in Apache Tomcat, identified as CVE-2024-38286, has raised significant concerns among cybersecurity experts. This flaw allows attackers to trigger a Denial ... https://t.co/VvlKeuKi6A
0
0
0
🚨 Apache #TomCat #VulnerabilityAlert (CVE-2024-38286) A new DoS flaw allows attackers to exploit the #TLS handshake, causing memory exhaustion and system crashes. This affects Tomcat versions 9.0.13 to 9.0.89, 10.1.0-M1 to 10.1.24, and 11.0.0-M1 to 11.0.0-M20. 🔒 What to do:
0
0
0
CVE-2024-38286: Denial-of-Service Vulnerability Discovered in Apache Tomcat https://t.co/k7p7xxSpp2 "The following versions of Apache Tomcat are impacted: Apache Tomcat 11.0.0-M1 to 11.0.0-M20 Apache Tomcat 10.1.0-M1 to 10.1.24 Apache Tomcat 9.0.13 to 9.0.89"
0
0
0
[SECURITY] CVE-2024-38286 Apache Tomcat - Denial of Service #AI https://t.co/lMAR2p0qmC
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s

CWE Details

CWE IDCWE NameDescription
CWE-770Allocation of Resources Without Limits or ThrottlingThe software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence