Critical security vulnerability in Apache Tomcat (CVE-2025-24813 score of 9.8/10)

A critical security vulnerability CVE-2025-24813 (score of 9.8) has been discovered in Apache Tomcat.

This RCE (Remote Code Execution) type vulnerability presents the risk that a malicious actor could execute arbitrary code remotely on a machine, without requiring any authentication. In other words, the attack can be successful even if you use a very complex password with MFA to access the server with the RCE vulnerability.

 

Vulnerable Apache Tomcat versions

The following versions of Apache Tomcat are affected:

  • Apache Tomcat 11.0.0-M1 to 11.0.2
  • Apache Tomcat 10.1.0-M1 to 10.1.34
  • Apache Tomcat 9.0.0.M1 to 9.0.98

 

Considerations on vulnerabilities with a score of 9.8

The vulnerability score is very high (9.8 on a scale of 10), which means that:

  • The vulnerability can be easily exploited remotely.
  • No authentication is required to exploit the vulnerability.
  • The attacker does not need to know the password of the attacked server
  • The vulnerability can be exploited easily.
  • The impacts can be major on the target attacked

 

Proofs of concepts (POC) are currently available

  • Proofs of concepts /POC (computer programs showing how the vulnerability can be exploited) are currently available and accessible on the Internet. Anyone can download them.
  • The existence of POC greatly increases the risk of exploiting a vulnerability.

 

Recommendations

You must update your Apache Tomcat systems as follows:

  • Apache Tomcat 11.0.0-M1 to 11.0.2: migrate to version 11.0.3 or more recent.
  • Apache Tomcat 10.1.0-M1 to 10.1.34: migrate to version 10.1.35 or more recent.
  • Apache Tomcat 9.0.0.M1 to 9.0.98: migrate to version 9.0.99 or more recent.

Additional recommendations (if you are unable to obtain the full list of your Apache Tomcat servers):

  • Perform a vulnerability scan of your web servers (internal and external) to ensure that they are not vulnerable.
  • Start by scanning your web servers exposed on the Internet. These servers will be attacked first.
  • After that, scan your web servers that are only accessible internally.

 

How does Streamscan protect you?

If you are a Streamscan partner:

  • We have set up a crisis unit to monitor the evolution of this critical vulnerability. We will apply the appropriate response measures.
  • Our DRG/MDR security monitoring team remains vigilant in monitoring your network.

Need help improving your cybersecurity? Talk to one of our experts or call us at +1 877 208-9040.