Description
In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely.
Published: 2020-09-01
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-0894 In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely.
Github GHSA Github GHSA GHSA-24ww-mc5x-xc43 Man-in-the-middle attack in Apache Cassandra
History

No history.

Subscriptions

Apache Cassandra
Netapp Oncommand Insight
Redhat Integration
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T12:32:14.251Z

Reserved: 2020-06-08T00:00:00.000Z

Link: CVE-2020-13946

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-01T21:15:11.833

Modified: 2024-11-21T05:02:12.400

Link: CVE-2020-13946

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-09-01T00:00:00Z

Links: CVE-2020-13946 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses