
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-38286 is an Allocation of Resources Without Limits or Throttling vulnerability affecting Apache Tomcat versions from 11.0.0-M1 through 11.0.0-M20, 10.1.0-M1 through 10.1.24, and 9.0.13 through 9.0.89. The vulnerability was discovered on June 4, 2024, and publicly disclosed on September 23, 2024. This security flaw affects Apache Tomcat installations under certain configurations on any platform (Apache List, CVE Mitre).
The vulnerability allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. The issue has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H by NIST NVD, while Apache Software Foundation rated it with a CVSS score of 8.6 (HIGH) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H (NVD).
When successfully exploited, this vulnerability can lead to a Denial of Service (DoS) condition through memory exhaustion. The attack specifically targets systems using TLS 1.3 configurations, potentially causing service disruption through OutOfMemoryError conditions (NetApp Advisory).
Users are recommended to upgrade to the fixed versions: Apache Tomcat 11.0.0-M21, 10.1.25, or 9.0.90. These versions contain the necessary patches to address the vulnerability (CVE Mitre).
The vulnerability was initially reported by Ozaki from North Grid Corporation. Various organizations have responded to this security issue, including NetApp, which has conducted extensive reviews of their products to identify affected systems and provide appropriate guidance to their customers (NetApp Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”