// For flags

CVE-2017-9797

 

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

When an Apache Geode cluster before v1.2.1 is operating in secure mode, an unauthenticated client can enter multi-user authentication mode and send metadata messages. These metadata operations could leak information about application data types. In addition, an attacker could perform a denial of service attack on the cluster.

Cuando un clúster de Apache Geode en versiones anteriores a la 1.2.1 opera en modo seguro, un cliente sin autenticar puede entrar en modo de autenticación multi-user y enviar mensajes con metadatos. Estas operaciones con metadatos podrían filtrar información sobre tipos de datos de aplicación. Además, un atacante podría llevar a cabo un ataque de denegación de servicio (DoS) en el clúster.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-06-21 CVE Reserved
  • 2017-10-02 CVE Published
  • 2024-06-11 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Geode
Search vendor "Apache" for product "Geode"
<= 1.2.0
Search vendor "Apache" for product "Geode" and version " <= 1.2.0"
-
Affected