Vulnerability Details : CVE-2022-37022
Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15. Use of 1.15 on Java 11 will automatically protect JMX over RMI against deserialization attacks. This should have no impact on performance since it only affects JMX/RMI which Gfsh uses to communicate with the JMX Manager which is hosted on a Locator.
Products affected by CVE-2022-37022
- cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-37022
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-37022
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-37022
-
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.Assigned by:
- nvd@nist.gov (Primary)
- security@apache.org (Secondary)
References for CVE-2022-37022
-
https://lists.apache.org/thread/kr1y4l9752g1ww1shnmh8dbfjq785k4m
CVE-2022-37022: Apache Geode deserialization of untrusted data flaw when using JMX over RMI on Java 11-Apache Mail ArchivesMailing List;Vendor Advisory
Jump to