New Report Alert: Top Ransomware Attacks of 2025. Being Prepared for 2026

CVE-2025-48989

CVE-2025-48989 - Apache Tomcat ‘MadeYouReset’ Vulnerability and Its Impact on Availability

Vulnerability Overview 

CVE ID: CVE-2025-48989 

CVE Title: Apache Tomcat “MadeYouReset” Denial-of-Service Vulnerability 

Severity: High  

Exploit Status: No public proof-of-concept available; no active exploitation reported 

Business Risk: High risk of service disruption from memory exhaustion and server downtime.

Summary

CVE-2025-48989 is a serious Apache Tomcat HTTP/2 flaw. Improper resource shutdown in the tomcat-coyote component lets attackers trigger a “MadeYouReset” DoS. It affects versions 11.0.0-M1 to 11.0.9, 10.1.0-M1 to 10.1.43, and 9.0.0.M1 to 9.0.107. Updating to 11.0.10, 10.1.44, or 9.0.108 resolves it.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-48989?

Technical Overview

How Does the CVE-2025-48989 Exploit Work?

The attack typically follows these steps:

CVE-2025-48989 Exploitation Process

What Causes CVE-2025-48989?

Vulnerability Root Cause:  

The vulnerability occurs in Tomcat’s HTTP/2 handling: certain reset frames do not release internal resources properly, leaving memory and connections tied up. Repeated or multiple crafted requests can overload these resources, leading to a denial-of-service.

How Can You Mitigate CVE-2025-48989?

If immediate patching is delayed or not possible:  

  • Disable HTTP/2 where possible, since the flaw affects HTTP/2 streams. 
  • Apply rate limits to control connection floods. 
  • Monitor resources for memory spikes or high stream counts. 
  • Tighten timeouts and stream limits in Tomcat and proxies. 
  • Restrict HTTP/2 access to trusted systems only. 
  • Upgrade soon to Tomcat 11.0.10, 10.1.44, or 9.0.108.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-48989 Cause Downtime?

Patch application impact: Low. Patching usually needs a simple service restart, causing little downtime.

How Can You Detect CVE-2025-48989 Exploitation?

Exploitation Signatures:

Behavioral Indicators:

Alerting Strategy:

CVSS Breakdown Table

MetricValue Description
Base Score7.5High-severity vulnerability with significant availability impact.
Attack VectorNetworkExploitable remotely over HTTP/2 connections.
Attack ComplexityLowAttack requires no special conditions or advanced setup.
Privileges RequiredNoneExploitation does not need authentication or elevated privileges.
User Interaction NoneNo user action is required for exploitation.
Scope UnChanged Impact is limited to the affected Apache Tomcat component.
Confidentiality Impact NoneNo data disclosure is expected from this issue.
Integrity ImpactNoneNo unauthorized data modification occurs.
Availability ImpactNoneExploitation can exhaust system resources, causing denial of service.

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.