Description
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
Published: 2017-04-06
Score: 9.8 Critical
EPSS: 93.8% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-728-1 tomcat6 security update
Debian DLA Debian DLA DLA-729-1 tomcat7 security update
Debian DSA Debian DSA DSA-3738-1 tomcat7 security update
Debian DSA Debian DSA DSA-3739-1 tomcat8 security update
Github GHSA Github GHSA GHSA-cw54-59pw-4g8c Apache Tomcat Improper Access Control vulnerability
Ubuntu USN Ubuntu USN USN-3177-1 Tomcat vulnerabilities
Ubuntu USN Ubuntu USN USN-4557-1 Tomcat vulnerabilities
Ubuntu USN Ubuntu USN USN-7242-1 Tomcat vulnerability
References
Link Providers
http://rhn.redhat.com/errata/RHSA-2017-0457.html cve-icon cve-icon
http://seclists.org/oss-sec/2016/q4/502 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1767644 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1767656 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1767676 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1767684 cve-icon cve-icon
http://tomcat.apache.org/security-6.html cve-icon cve-icon
http://tomcat.apache.org/security-7.html cve-icon cve-icon
http://tomcat.apache.org/security-8.html cve-icon cve-icon
http://tomcat.apache.org/security-9.html cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3738 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html cve-icon cve-icon
http://www.securityfocus.com/bid/94463 cve-icon cve-icon
http://www.securitytracker.com/id/1037331 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:0455 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:0456 cve-icon cve-icon
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2016-8735 cve-icon
https://security.netapp.com/advisory/ntap-20180607-0001/ cve-icon cve-icon
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48 cve-icon
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73 cve-icon
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39 cve-icon
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8 cve-icon
https://usn.ubuntu.com/4557-1/ cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-8735 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2016-8735 cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 04 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-05-12'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 00:00:00 +0000

Type Values Removed Values Added
References

Subscriptions

Apache Tomcat
Canonical Ubuntu Linux
Debian Debian Linux
Netapp 7-mode Transition Tool Oncommand Insight Oncommand Shift Snap Creator Framework
Oracle Agile Engineering Data Management Agile Plm Communications Application Session Controller Communications Instant Messaging Server Communications Interactive Session Recorder Hospitality Guest Access Micros Relate Crm Software Micros Retail Xbri Loss Prevention Mysql Enterprise Monitor Retail Convenience And Fuel Pos Software Transportation Management
Redhat Jboss Enterprise Web Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-10-21T23:55:42.758Z

Reserved: 2016-10-18T00:00:00.000Z

Link: CVE-2016-8735

cve-icon Vulnrichment

Updated: 2024-08-06T02:27:41.259Z

cve-icon NVD

Status : Deferred

Published: 2017-04-06T21:59:00.243

Modified: 2025-10-22T00:15:56.793

Link: CVE-2016-8735

cve-icon Redhat

Severity : Important

Publid Date: 2016-11-22T00:00:00Z

Links: CVE-2016-8735 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses