Hostname Verification Flaw in Apache Geode's TLS Implementation
CVE-2019-10091

7.4HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
16 March 2020

Summary

A security vulnerability exists in Apache Geode when TLS is enabled and ssl-endpoint-identification-enabled is set to true. The product fails to properly verify the hostname entries in the Subject Alternative Name (SAN) field during the SSL handshake process. This oversight may allow an attacker to engage in a man-in-the-middle attack, compromising the security of intra-cluster communications. Users of Apache Geode should take immediate steps to assess and mitigate this risk to ensure their deployments remain secure.

Affected Version(s)

Apache Geode Apache Tomcat 1.9.0

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.