CVE-2020-17516

Severity
7.5HIGH
EPSS
0.9%
top 25.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 3
Latest updateFeb 9

Description

Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Mavenorg.apache.cassandra:cassandra-all2.1.03.0.24+1
NVDapache/cassandra2.1.02.1.22+3
CVEListV5apache_cassandra4 versions+3

🔴Vulnerability Details

3
OSV
Authentication Bypass in Apache Cassandra2022-02-09
GHSA
Authentication Bypass in Apache Cassandra2022-02-09
CVEList
CVE-2020-17516: Apache Cassandra versions 22021-02-03

📋Vendor Advisories

1
Red Hat
cassandra: internode encryption enforcement vulnerability2021-02-02
CVE-2020-17516 (HIGH CVSS 7.5) | Apache Cassandra versions 2.1.0 to | cvebase.io