Cyber Security News

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through the recently disclosed vulnerability, CVE-2025-24813.

This vulnerability allows attackers to potentially execute remote code (RCE) if successfully exploited.

The cybersecurity firm GreyNoise has identified multiple IPs involved in these attacks across several regions, highlighting the urgency for organizations to update their systems immediately.

CVE-2025-24813: A Growing Threat

CVE-2025-24813 is capable of enabling remote code execution, which poses significant risks to the security of systems running Apache Tomcat.

The good news is that the current exploitation seems limited to naive attackers using publicly available proof-of-concept (PoC) code.

However, this could be a precursor to more sophisticated attacks as the vulnerability becomes widely known.

GreyNoise has created a specific CVE-2025-24813 tag to help defenders track and respond to these malicious activities efficiently.

Since March 17, 2025, GreyNoise has detected four unique IPs attempting to exploit this vulnerability.

These attackers are using a partial PUT method to inject malicious payloads, which could lead to arbitrary code execution on vulnerable systems. The geographic distribution of these attempts highlights a diverse range of targets:

  • Geographic Distribution: The majority of exploit attempts have been directed at systems in the United States, Japan, India, South Korea, and Mexico, with over 70% of sessions aimed at U.S.-based systems.
  • Attack Origin: The earliest exploitation attempts were observed on March 11, but significant activity was noted starting from a Latvia-based IP on March 18. Subsequent attempts were traced to Italy, the United States, and China. Notably, two of these IPs are linked to a known VPN service, indicating potential evasion tactics.

Mitigations & Recommendations

Given the seriousness of CVE-2025-24813 and the ongoing exploitation, organizations must take immediate action to secure their systems:

  1. Apply Patches: Organizations should promptly apply the latest security patches for Apache Tomcat.
  2. Monitor Web Server Logs: Regularly monitor for unexpected PUT requests to detect potential attacks.
  3. Deploy WAF Rules: Configure Web Application Firewall (WAF) rules to block malicious payloads effectively.
  4. Use GreyNoise Intelligence: Utilize GreyNoise’s real-time tracking capabilities to identify and block malicious IPs.

Organizations should assess their Apache Tomcat deployments urgently and apply patches to mitigate the risks associated with CVE-2025-24813.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

APT Hackers Exploit Google Chrome Zero-Day in Operation ForumTroll to Bypass Sandbox Protections

In mid-March 2025, Kaspersky researchers uncovered a sophisticated APT attack, dubbed Operation ForumTroll, which leveraged…

18 minutes ago

New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit

Researchers at QiAnXin XLab have uncovered a sophisticated Linux-based backdoor dubbed OrpaCrab, specifically targeting industrial…

22 minutes ago

New Chrome Installer Fails on Windows 10 & 11 With “This app can’t run on your PC” Error

A recent snag in Google's Chrome distribution process has left Windows users unable to install…

1 hour ago

North Korean Kimsuky Hackers Deploy New Tactics and Malicious Scripts in Recent Attacks

Security researchers have uncovered a new attack campaign by the North Korean state-sponsored APT group…

1 hour ago

Critical NetApp SnapCenter Server Vulnerability Allows Attackers to Gain Admin Access

A critical vulnerability has been identified in NetApp's SnapCenter Server, affecting versions before 6.0.1P1 and…

2 hours ago

Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors

In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and…

2 hours ago