CW Pakistan
  • Legacy
    • Legacy Editorial
    • Editor’s Note
  • Academy
  • Wired
  • Cellcos
  • PayTech
  • Business
  • Ignite
  • Digital Pakistan
  • PSEB
    • DFDI
    • Indus AI Week
  • PASHA
  • TechAdvisor
  • GamePro
  • Partnerships
  • PCWorld
  • Macworld
  • Infoworld
  • TechHive
  • TechAdvisor
0
0
0
0
0
Subscribe
CW Pakistan
CW Pakistan CW Pakistan
  • Legacy
    • Legacy Editorial
    • Editor’s Note
  • Academy
  • Wired
  • Cellcos
  • PayTech
  • Business
  • Ignite
  • Digital Pakistan
  • PSEB
    • DFDI
    • Indus AI Week
  • PASHA
  • TechAdvisor
  • GamePro
  • Partnerships
  • Business

NCERT Warns of Critical Apache Tomcat Vulnerability Allowing Remote Server Takeover

  • March 28, 2025
Total
0
Shares
0
0
0
Share
Tweet
Share
Share
Share
Share

The National Computer Emergency Response Team (NCERT) has issued an urgent security advisory warning organizations about a critical vulnerability in Apache Tomcat servers that could potentially allow cybercriminals to gain complete control of affected systems. The flaw, identified as CVE-2025-24813, has been classified as a high-severity remote code execution (RCE) vulnerability and poses a significant threat to organizations utilizing Apache Tomcat to host their web applications and services.

According to the NCERT advisory issued in March 2025, the vulnerability stems from improper handling of HTTP/2 requests by the Apache Tomcat server. This flaw can be exploited by remote attackers to execute arbitrary code without needing elevated privileges. Cybersecurity researchers have confirmed that attackers can craft malicious HTTP/2 requests which, when processed by a vulnerable Tomcat server, could enable them to execute unauthorized commands, gain access to sensitive data, and manipulate critical system configurations.

The threat landscape surrounding this vulnerability has become more serious as security analysts have reported that malicious actors are already exploiting CVE-2025-24813 in the wild. The availability of a public proof-of-concept (PoC) exploit has accelerated the risk, making it easier for attackers to launch attacks remotely without requiring any prior authentication or special permissions. In several cases, this vulnerability has been used not only to gain unauthorized access but also to deploy backdoors, malware, and malicious payloads on compromised systems. Threat actors have further used this flaw to conduct denial-of-service (DoS) attacks by overloading server resources, leading to service outages.

The NCERT advisory emphasizes that organizations running vulnerable versions of Apache Tomcat are at immediate risk and must act without delay. Specifically, it is recommended that affected organizations disable HTTP/2 support in their Tomcat server configurations to reduce the attack surface. This can be achieved by removing or commenting out the UpgradeProtocol directive in the server’s configuration files. Additionally, NCERT advises organizations to strengthen firewall rules and limit external access to Tomcat servers, allowing only trusted IP addresses to connect.

Furthermore, system administrators are urged to monitor server logs for any indicators of compromise, including unusual serialized object data or suspicious HTTP/2 request patterns that may indicate malicious activity. Proactive monitoring can help detect and mitigate attacks at an early stage.

To fully eliminate the vulnerability, NCERT recommends upgrading Apache Tomcat to the latest patched versions released by the official Apache Software Foundation. These include Tomcat 10.1.7 or later, Tomcat 9.0.84 or later, and Tomcat 8.5.93 or later. The advisory stresses the importance of downloading security patches only from official Tomcat sources to avoid supply chain risks.

In addition to applying patches and hardening server configurations, NCERT encourages organizations to implement a comprehensive incident response strategy. This includes conducting forensic analysis of potentially compromised systems, restoring from verified clean backups, and enhancing security monitoring frameworks to detect any further intrusion attempts.

NCERT’s advisory serves as a timely reminder of the critical importance of timely vulnerability management, strong access controls, and continuous monitoring in safeguarding digital infrastructure. Organizations using Apache Tomcat are strongly urged to take immediate steps to secure their systems and prevent possible exploitation of this serious vulnerability.

Share
Tweet
Share
Share
Share
Previous Article
  • PayTech

easypaisa Launches Insurance Marketplace to Provide Accessible Digital Insurance Solutions

  • March 28, 2025
Read More
Next Article
  • Business

Cyberattack on Kuala Lumpur International Airport Disrupts Operations as Hackers Demand $10M Ransom

  • March 28, 2025
Read More
You May Also Like
Read More
  • Business

Karachi School Of Business And Leadership Becomes First Pakistani University In 18 Years To Win CFA Institute Research Challenge Regional Semi-Finals

  • Press Desk
  • April 13, 2026
Read More
  • Business

DG Customs Valuation Revises Import Values For Lithium-Ion Batteries Under Valuation Ruling 2062 Of 2026

  • Press Desk
  • April 11, 2026
Read More
  • Business

AirSial Signs On As Official Sponsor Of SIMAP Technology And Innovation Summit 2026 In Sialkot

  • Press Desk
  • April 11, 2026
Read More
  • Business

SIMAP Technology And Innovation Summit 2026: Fourth Edition Coming To Sialkot This April

  • Press Desk
  • April 10, 2026
Read More
  • Business

WorldCall Plans Rebranding To WorldCall Technologies With UAE Expansion And Restructuring

  • Press Desk
  • April 9, 2026
Read More
  • Business

Supernet Builds Multi Billion Pipeline After PSX Main Board Move With Strong Revenue Growth

  • Press Desk
  • April 8, 2026
Read More
  • Business

Systems Limited Reports 48 Percent Growth In Consolidated Net Profit For Calendar Year 2025

  • Press Desk
  • April 7, 2026
Read More
  • Business

Omoda E5 EV Introduces Limited Time Offer For Buyers In Pakistan

  • Press Desk
  • April 6, 2026
Trending Posts
  • NED University Launches Two-Month Online AI-Powered Project Management Course For Future Leaders
    • April 13, 2026
  • HEC Launches Free eCornell Certified “Take The Lead” Program For 10,000 Women Across Pakistan Under PM Youth Programme
    • April 13, 2026
  • Punjab Government Prepares Draft Of Online Safety Act 2026 And Approves Dedicated Cybercrime Unit To Protect Women And Children
    • April 13, 2026
  • Karachi School Of Business And Leadership Becomes First Pakistani University In 18 Years To Win CFA Institute Research Challenge Regional Semi-Finals
    • April 13, 2026
  • Asus Zenbook A16 2026 Review: The Lightest 16-Inch Ultraportable Yet Powered By Qualcomm Snapdragon X2
    • April 13, 2026
about
CWPK Legacy
Launched in 1967 internationally, ComputerWorld is the oldest tech magazine/media property in the world. In Pakistan, ComputerWorld was launched in 1995. Initially providing news to IT executives only, once CIO Pakistan, its sister brand from the same family, was launched and took over the enterprise reporting domain in Pakistan, CWPK has emerged as a holistic technology media platform reporting everything tech in the country. It remains the oldest continuous IT publishing brand in the country and in 2025 is set to turn 30 years old, which will be its biggest benchmark and a legacy it hopes to continue for years to come. CWPK is part of the SPIN/IDG Wakhan media umbrella.
Read more
Explore Computerworld Sites Globally
  • computerworld.es
  • computerworld.com.pt
  • computerworld.com
  • cw.no
  • computerworldmexico.com.mx
  • computerwoche.de
  • computersweden.idg.se
  • computerworld.hu
Content from other IDG brands
  • PCWorld
  • Macworld
  • Infoworld
  • TechHive
  • TechAdvisor
CW Pakistan CW Pakistan
  • CWPK
  • CXO
  • DEMO
  • WALLET

CW Media & all its sub-brands are copyrighted to SPIN-IDG Wakhan Media Inc., the publishing arm of NCC-RP Group. This site is designed by Crunch Collective. ©️1995-2026. Read Privacy Policy.

Input your search keywords and press Enter.