
Cloud Vulnerability DB
A community-led vulnerabilities database
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) contains a vulnerability where it does not close the connection to the bookkeeper server when TLS hostname verification fails. This security flaw was identified and tracked as CVE-2022-32531, affecting BookKeeper client versions prior to 4.14.6 and 4.15.1 (NVD).
The vulnerability is classified with a CVSS v3.1 Base Score of 5.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N. The technical issue stems from improper certificate validation (CWE-295) where the client maintains an active connection even after TLS hostname verification fails (NVD).
The vulnerability leaves the bookkeeper client susceptible to man-in-the-middle attacks due to the continued connection after TLS hostname verification failure. This could potentially allow attackers to intercept and manipulate communication between the client and server (NVD).
Users should upgrade to Apache BookKeeper client version 4.14.6 or 4.15.1 or later to address this vulnerability. These versions include the necessary fixes to properly handle TLS hostname verification failures (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."