
Cloud Vulnerability DB
A community-led vulnerabilities database
The Connection handler in Hazelcast and Hazelcast Jet contains a critical vulnerability (CVE-2022-36437) that was disclosed on December 23, 2022. This security flaw affects multiple versions of Hazelcast, including versions through 3.12.12, 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2, as well as Hazelcast Jet versions through 4.5.3 (GitHub Advisory).
The vulnerability has been assigned a Critical severity rating with a CVSS v3.1 score of 9.1. The CVSS metrics indicate that the vulnerability can be exploited over the network with low attack complexity, requires no privileges or user interaction, and while the scope is unchanged, it has high impact on both confidentiality and integrity (GitHub Advisory).
The vulnerability allows an unauthenticated, remote attacker to access and manipulate data in the cluster by assuming the identity of another authenticated connection. This poses significant risks to data confidentiality and integrity within affected Hazelcast clusters (GitHub Advisory).
Patches have been released to address this vulnerability. Users should upgrade to Hazelcast Jet (and Enterprise) 4.5.4, Hazelcast IMDG (and Enterprise) 3.12.13, 4.1.10, 4.2.6, or Hazelcast Platform (and Enterprise) 5.1.3. While there is no known workaround, implementing TLS and mutual authentication can significantly reduce the risk of exploitation (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."