CVE-2020-11996
high-risk
Published 2020-06-26
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
Do I need to act?
!
45.1% chance of exploitation in next 30 days
EPSS score — higher than 55% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (48)
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200709-0002/
and 28 more references
68
/ 100
high-risk
Severity
26/34 · High
Exploitability
17/34 · Moderate
Exposure
25/34 · High