Hostname Verification Flaw in Apache Geode's TLS Implementation
CVE-2019-10091
7.4HIGH
Summary
A security vulnerability exists in Apache Geode when TLS is enabled and ssl-endpoint-identification-enabled is set to true. The product fails to properly verify the hostname entries in the Subject Alternative Name (SAN) field during the SSL handshake process. This oversight may allow an attacker to engage in a man-in-the-middle attack, compromising the security of intra-cluster communications. Users of Apache Geode should take immediate steps to assess and mitigate this risk to ensure their deployments remain secure.
Affected Version(s)
Apache Geode Apache Tomcat 1.9.0
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved