CVE-2024-23672
moderate-risk
Published 2024-03-13
Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
Do I need to act?
~
1.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (7)
Vendor Advisory
https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f
Vendor Advisory
https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240402-0002/
47
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
4/34 · Minimal
Exposure
20/34 · Moderate