// For flags

CVE-2022-37021

Apache Geode deserialization of untrusted data flaw when using JMX over RMI on Java 8.

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. If upgrading to Java 11 is not possible, then upgrade to Apache Geode 1.15 and specify "--J=-Dgeode.enableGlobalSerialFilter=true" when starting any Locators or Servers. Follow the documentation for details on specifying any user classes that may be serialized/deserialized with the "serializable-object-filter" configuration option. Using a global serial filter will impact performance.

Apache Geode versiones hasta 1.12.5, 1.13.4 y 1.14.0, son vulnerables a un fallo de deserialización de datos no confiables cuando es usado JMX sobre RMI en Java 8. Cualquier usuario que todavía esté en Java 8 y desee protegerse contra los ataques de deserialización que involucran a JMX o RMI debe actualizar a Apache Geode versión 1.15 y Java versión 11. Si la actualización a Java versión 11 no es posible, entonces actualice a Apache Geode versión 1.15 y especifique "--J=-Dgeode.enableGlobalSerialFilter=true" cuando inicie cualquier Localizador o Servidor. Siga la documentación para detalles sobre la especificación de cualquier clase de usuario que pueda ser serializada/de serializada con la opción de configuración "serializable-object-filter". El uso de un filtro global de serialización afectará al rendimiento

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-29 CVE Reserved
  • 2022-08-31 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-10-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Geode
Search vendor "Apache" for product "Geode"
<= 1.12.5
Search vendor "Apache" for product "Geode" and version " <= 1.12.5"
-
Affected
Apache
Search vendor "Apache"
Geode
Search vendor "Apache" for product "Geode"
>= 1.13.0 <= 1.13.4
Search vendor "Apache" for product "Geode" and version " >= 1.13.0 <= 1.13.4"
-
Affected
Apache
Search vendor "Apache"
Geode
Search vendor "Apache" for product "Geode"
1.14.0
Search vendor "Apache" for product "Geode" and version "1.14.0"
-
Affected