Impact
The vulnerability permits every server‑side AuthenticationException message to be relayed back to an unauthenticated remote caller in the gRPC status description. This reveals information about the nature of the authentication failure, potentially aiding attackers in refining their attack vectors. The weakness aligns with CWE‑209, which relates to information exposure through error messages.
Affected Systems
Spring gRPC versions 1.0.0 through 1.0.2, as well as any older unsupported releases, are affected. The issue was fixed in version 1.0.3.
Risk and Exploitability
The CVSS score of 3.7 indicates a moderate severity, and no EPSS score is provided. The vulnerability is not listed in CISA KEV. Attackers can exploit it remotely by invoking gRPC methods without proper authentication, receiving detailed status descriptions that disclose failure reasons. The attack requires no special credentials and can be performed over any exposed gRPC endpoint.
OpenCVE Enrichment