Improper TLS Protocol Support in Apache NiFi by the Apache Software Foundation
CVE-2020-9491

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
1 October 2020

Summary

In versions 1.2.0 to 1.11.4 of Apache NiFi, the user interface (UI) and Application Programming Interface (API) enforced the use of TLS v1.2 to enhance security for incoming requests. However, intracluster communications like request replication and Site-to-Site communications were still operating under outdated TLS v1.0 and v1.1 protocols. This inconsistency in security protocols could expose sensitive data during transmission, necessitating urgent updates to ensure uniform encryption standards across all communications.

Affected Version(s)

Apache NiFi Apache NiFi 1.2.0 to 1.11.4

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.