Monday, April 21, 2025
HomeCVE/vulnerabilityHackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

Published on

SIEM as a Service

Follow Us on Google News

A concerning development has emerged with the active exploitation of Apache Tomcat servers through the recently disclosed vulnerability, CVE-2025-24813.

This vulnerability allows attackers to potentially execute remote code (RCE) if successfully exploited.

The cybersecurity firm GreyNoise has identified multiple IPs involved in these attacks across several regions, highlighting the urgency for organizations to update their systems immediately.

- Advertisement - Google News

CVE-2025-24813: A Growing Threat

CVE-2025-24813 is capable of enabling remote code execution, which poses significant risks to the security of systems running Apache Tomcat.

The good news is that the current exploitation seems limited to naive attackers using publicly available proof-of-concept (PoC) code.

However, this could be a precursor to more sophisticated attacks as the vulnerability becomes widely known.

GreyNoise has created a specific CVE-2025-24813 tag to help defenders track and respond to these malicious activities efficiently.

Since March 17, 2025, GreyNoise has detected four unique IPs attempting to exploit this vulnerability.

These attackers are using a partial PUT method to inject malicious payloads, which could lead to arbitrary code execution on vulnerable systems. The geographic distribution of these attempts highlights a diverse range of targets:

  • Geographic Distribution: The majority of exploit attempts have been directed at systems in the United States, Japan, India, South Korea, and Mexico, with over 70% of sessions aimed at U.S.-based systems.
  • Attack Origin: The earliest exploitation attempts were observed on March 11, but significant activity was noted starting from a Latvia-based IP on March 18. Subsequent attempts were traced to Italy, the United States, and China. Notably, two of these IPs are linked to a known VPN service, indicating potential evasion tactics.

Mitigations & Recommendations

Given the seriousness of CVE-2025-24813 and the ongoing exploitation, organizations must take immediate action to secure their systems:

  1. Apply Patches: Organizations should promptly apply the latest security patches for Apache Tomcat.
  2. Monitor Web Server Logs: Regularly monitor for unexpected PUT requests to detect potential attacks.
  3. Deploy WAF Rules: Configure Web Application Firewall (WAF) rules to block malicious payloads effectively.
  4. Use GreyNoise Intelligence: Utilize GreyNoise’s real-time tracking capabilities to identify and block malicious IPs.

Organizations should assess their Apache Tomcat deployments urgently and apply patches to mitigate the risks associated with CVE-2025-24813.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to...

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

A sophisticated phishing attack exploiting a loophole in Google’s OAuth infrastructure has surfaced, raising...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to...