See every side of every news story
Published loading...Updated

'Dead simple' RCE exploit in Apache Tomcat under attack

  • A critical remote code execution vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is under active exploitation and allows attackers to take control of servers with a simple PUT request.
  • The vulnerability was disclosed on March 10, and an exploit was publicly shared 30 hours later, according to Wallarm.
  • The Apache Foundation classified this flaw as important and recommended users upgrade to patched versions 11.0.3+, 10.1.35+, or 9.0.99+ to mitigate the risks.
  • Wallarm noted the potential for more similar vulnerabilities due to the partial PUT handling in Tomcat, stating, 'This attack is dead simple to execute and requires no authentication.
Insights by Ground AI
Does this summary seem wrong?

11 Articles

All
Left
Center
2
Right
Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center
Factuality

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

GBHackers On Security broke the news in on Monday, March 17, 2025.
Sources are mostly out of (0)

Similar News Topics

You have read out of your 5 free daily articles.

Join us as a member to unlock exclusive access to diverse content.