CVE-2020-25694
PostgreSQL vulnerability analysis and mitigation

Overview

A security vulnerability (CVE-2020-25694) was discovered in PostgreSQL versions before 13.1, 12.5, 11.10, 10.15, 9.6.20, and 9.5.24. The vulnerability occurs when a client application creates additional database connections but only reuses basic connection parameters while dropping security-relevant parameters, which could potentially lead to security issues (PostgreSQL Security, NVD Database).

Technical details

The vulnerability is related to connection parameter handling in PostgreSQL client applications. When creating additional database connections, affected applications (including clusterdb, pgdump, pgrestore, psql, reindexdb, and vacuumdb) only reuse basic connection parameters like host, user, and port, while dropping security-relevant parameters such as channel_binding, sslmode, requirepeer, and gssencmode. This creates a security weakness that could be exploited. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).

Impact

The vulnerability could enable a man-in-the-middle attack or allow an attacker to observe clear-text transmissions. The highest threats from this vulnerability are to data confidentiality and integrity as well as system availability. This could potentially lead to unauthorized access to sensitive information, modification of data, or system disruption (NVD Database, NetApp Advisory).

Mitigation and workarounds

The vulnerability has been fixed in PostgreSQL versions 13.1, 12.5, 11.10, 10.15, 9.6.20, and 9.5.24. Users are strongly advised to upgrade to these or later versions to address the security issue. The fix ensures that security-relevant parameters are properly maintained when creating additional database connections (PostgreSQL Security, Debian Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management