
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability (CVE-2024-27137) has been identified in Apache Cassandra that affects versions 4.0.2 through 5.0.2 running on Java 11. This vulnerability is related to unrestricted deserialization of JMX authentication credentials and is a reoccurrence of a previously known issue (CVE-2020-13946) that emerged due to Java option changes in JDK10 (RedHat).
The vulnerability has been assigned a CVSS v3.1 score of 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) and is classified as CWE-200. It enables a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack, potentially capturing usernames and passwords used for JMX interface access (RedHat).
The successful exploitation of this vulnerability allows attackers to capture JMX interface credentials and subsequently use these stolen credentials to perform unauthorized operations on the affected system (SecurityOnline).
Organizations are advised to upgrade to patched versions equal to or later than 4.0.15, 4.1.8, or 5.0.3 to address this vulnerability. This fix has been implemented across multiple versions to ensure comprehensive protection against the security flaw (RedHat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."