Impact
Improper validation of TLS certificates in the TSSLTransportFactory class allows a holder of a certificate with an incorrect hostname to impersonate a genuine Thrift server. This flaw stems from a failure to check the hostname during the SSL/TLS handshake, falling under CWE‑297. An attacker could therefore inject, eavesdrop or modify data between a client and the Thrift service, compromising confidentiality and integrity.
Affected Systems
The vulnerability affects Apache Thrift implementations prior to version 0.23.0. Any instance of the Thrift library that relies on TSSLTransportFactory for encrypted transport is at risk if the upgrade has not been performed.
Risk and Exploitability
External data indicate the EPSS score is not listed and the vulnerability is not present in the CISA KEV catalog. The CVSS score is not provided; however, the flaw permits a network attacker to intercept traffic if the client does not enforce hostname verification. The likely attack vector is over a network channel where a client connects to a Thrift server, making the flaw exploitable without local privilege.
OpenCVE Enrichment