Severity
5.3MEDIUM
EPSS
0.1%
top 71.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 4

Description

In Apache Cassandra it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorized operations. This is same vulnerability that CVE-2020-13946 was issued for, but the Java option was changed in JDK10. This issue affec

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:LExploitability: 1.8 | Impact: 3.4

Affected Packages3 packages

NVDapache/cassandra4.0.24.0.15+3
Mavenorg.apache.cassandra:cassandra-all5.0-beta15.0.3+2
CVEListV5apache_software_foundation/apache_cassandra4.0.24.0.15+2

🔴Vulnerability Details

3
CVEList
Apache Cassandra: unrestricted deserialization of JMX authentication credentials2025-02-04
GHSA
Apache Cassandra: unrestricted deserialization of JMX authentication credentials2025-02-04
OSV
Apache Cassandra: unrestricted deserialization of JMX authentication credentials2025-02-04

📋Vendor Advisories

1
Red Hat
org.apache.cassandra:cassandra-all: Apache Cassandra: unrestricted deserialization of JMX authentication credentials2025-02-04
CVE-2024-27137 (MEDIUM CVSS 5.3) | In Apache Cassandra it is possible | cvebase.io