Impact
The vulnerability arises from Spring Data Geode using a non‑privileged temporary directory when importing snapshot archives, causing extracted files to be placed in a predictable, world‑readable system temp location. This flaw can lead to unauthorized disclosure of cache contents to local users with basic privileges, as they can read the extracted data created by another user. The weakness involves insecure temp directory usage, aligning with CWE‑378, CWE‑379, and CWE‑538.
Affected Systems
Affected systems include VMware Spring Data Gemfire and VMware Spring Data Geode implementations. No specific product versions are listed in the CNA data, so all installations that use snapshot import functions before the patch should be reviewed. Administrators should verify whether the application was built with the vulnerable component.
Risk and Exploitability
The CVSS base score is 4.8, indicating moderate severity, while the EPSS score is below 1%, suggesting a low likelihood of exploitation at this time. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires a local user with basic privileges on a shared host and the ability to trigger a snapshot import, implying a local attack vector. Given the moderate impact on confidentiality and the low probability of attack, organizations should assess the risk and consider remediation promptly.
OpenCVE Enrichment