Lucene search

K
cvelistApacheCVELIST:CVE-2021-38296
HistoryMar 10, 2022 - 8:20 a.m.

CVE-2021-38296 Apache Spark Key Negotiation Vulnerability

2022-03-1008:20:12
CWE-294
apache
www.cve.org

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.1%

Apache Spark supports end-to-end encryption of RPC connections via “spark.authenticate” and “spark.network.crypto.enabled”. In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by “spark.authenticate.enableSaslEncryption”, “spark.io.encryption.enabled”, “spark.ssl”, “spark.ui.strictTransportSecurity”. Update to Apache Spark 3.1.3 or later

CNA Affected

[
  {
    "product": "Apache Spark",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "3.1.2",
        "status": "affected",
        "version": "up to and including version 3.1.2",
        "versionType": "custom"
      }
    ]
  }
]

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.1%

Related for CVELIST:CVE-2021-38296