A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.
2020-03-16T15:15:12.130
2024-11-21T04:27:36.843
Modified
CVSSv3.1: 9.1 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:N
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | jboss_data_grid | 7.0.0 | Yes |
Application | redhat | jboss_enterprise_application_platform | 7.0.0 | Yes |
Application | redhat | jboss_fuse | 7.0.0 | Yes |
Application | redhat | openshift_application_runtimes | - | Yes |
Application | redhat | single_sign-on | 7.0 | Yes |
Application | redhat | wildfly | 7.2.0 | Yes |
Application | redhat | wildfly | 7.2.3 | Yes |
Application | redhat | wildfly | 7.2.5 | Yes |