Christoffer S.<p>(recordedfuture.com) Apache Tomcat: Critical Path Equivalence Vulnerability (CVE-2025-24813) NOT (yet) under active exploitation</p><p><a href="https://www.recordedfuture.com/blog/apache-tomcat-cve-2025-24813-vulnerability-analysis" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">recordedfuture.com/blog/apache</span><span class="invisible">-tomcat-cve-2025-24813-vulnerability-analysis</span></a></p><p>Insikt Group notes specifically that this vulnerability has not yet been observed as being actively exploited in the wild.</p><p>Summary:<br>This article details CVE-2025-24813, a critical path equivalence vulnerability in Apache Tomcat that allows unauthenticated remote code execution under specific conditions. The vulnerability affects multiple Tomcat versions (11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0-M1 to 9.0.98, and most 8.5.x versions). Greynoise has identified six malicious IP addresses attempting to exploit this vulnerability, targeting systems in the US, Japan, Mexico, South Korea, and Australia. Multiple proof-of-concept exploits have been published, increasing the risk of exploitation. Organizations are advised to upgrade to patched versions (11.0.3, 10.1.35, or 9.0.99) or implement network-level controls if immediate patching isn't possible.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> <a href="https://swecyb.com/tags/ActiveExploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveExploitation</span></a> <a href="https://swecyb.com/tags/ITW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITW</span></a> <a href="https://swecyb.com/tags/Exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploitation</span></a> <a href="https://swecyb.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://swecyb.com/tags/CVE202524813" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202524813</span></a></p>