Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-13946


In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely.


Published

2020-09-01T21:15:11.833

Last Modified

2024-11-21T05:02:12.400

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-668

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache cassandra < 2.1.22 Yes
Application apache cassandra < 2.2.18 Yes
Application apache cassandra < 3.0.22 Yes
Application apache cassandra < 3.11.8 Yes
Application apache cassandra 4.0.0 Yes
Application apache cassandra 4.0.0 Yes
Application apache cassandra 4.0.0 Yes
Application apache cassandra 4.0.0 Yes
Application apache cassandra 4.0.0 Yes
Application netapp oncommand_insight - Yes

References