CVE Vulnerabilities

CVE-2024-52317

Inadequate Encryption Strength

Published: Nov 18, 2024 | Modified: May 15, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users.

This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.

Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
TomcatApache9.0.92 (including)9.0.96 (excluding)
TomcatApache10.1.27 (including)10.1.31 (excluding)
TomcatApache11.0.0-milestone23 (including)11.0.0-milestone23 (including)
TomcatApache11.0.0-milestone24 (including)11.0.0-milestone24 (including)
TomcatApache11.0.0-milestone25 (including)11.0.0-milestone25 (including)
TomcatApache11.0.0-milestone26 (including)11.0.0-milestone26 (including)
Tomcat10Ubuntuesm-apps/noble*
Tomcat10Ubuntunoble*
Tomcat10Ubuntuoracular*
Tomcat10Ubuntuupstream*
Tomcat6Ubuntutrusty/esm*
Tomcat6Ubuntuupstream*
Tomcat7Ubuntutrusty/esm*
Tomcat7Ubuntuupstream*
Tomcat9Ubuntudevel*
Tomcat9Ubuntufocal*
Tomcat9Ubuntuoracular*
Tomcat9Ubuntuquesting*
Tomcat9Ubuntuupstream*

Potential Mitigations

References