CVE-2025-52434
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-11-04

Assigner: Apache Software Foundation

Description
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Tomcat when using the APR/Native connector. This was particularly noticeable with client initiated closes of HTTP/2 connections. This issue affects Apache Tomcat: from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 9.0.107, which fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache tomcat From 9.0.0 (inc) to 9.0.107 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-362 The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a race condition in Apache Tomcat's APR/Native connector, caused by concurrent execution using a shared resource with improper synchronization. It is especially noticeable when clients initiate closing HTTP/2 connections, potentially leading to unexpected behavior or errors.


How can this vulnerability impact me? :

The vulnerability can cause issues such as unexpected behavior or errors in Apache Tomcat when handling HTTP/2 connections, particularly during client-initiated connection closes. This may affect the stability or reliability of applications relying on Tomcat's APR/Native connector.


What immediate steps should I take to mitigate this vulnerability?

Users are recommended to upgrade Apache Tomcat to version 9.0.107, which fixes the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart