PT-2021-10094 · Apache · Apache Cassandra
Mark Denihan
·
Published
2021-02-03
·
Updated
2024-03-06
·
CVE-2020-17516
7.5
High
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions:
Apache Cassandra versions 2.1.0 through 2.1.22
Apache Cassandra versions 2.2.0 through 2.2.19
Apache Cassandra versions 3.0.0 through 3.0.23
Apache Cassandra versions 3.11.0 through 3.11.9
Description:
The issue allows both encrypted and unencrypted internode connections when using 'dc' or 'rack' internode encryption setting. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement.
Recommendations:
For Apache Cassandra versions 2.1.0 through 2.1.22, update the internode encryption setting to only allow encrypted connections.
For Apache Cassandra versions 2.2.0 through 2.2.19, update the internode encryption setting to only allow encrypted connections.
For Apache Cassandra versions 3.0.0 through 3.0.23, update the internode encryption setting to only allow encrypted connections.
For Apache Cassandra versions 3.11.0 through 3.11.9, update the internode encryption setting to only allow encrypted connections.
As a temporary workaround, consider restricting access to the internode connections to minimize the risk of exploitation.
Fix
Authentication Bypass by Spoofing
Weakness Enumeration
Related Identifiers
Affected Products
References · 81
- https://osv.dev/vulnerability/CVE-2020-17516 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-2vxm-vp4c-fjfw · Vendor Advisory
- https://osv.dev/vulnerability/BIT-cassandra-2020-17516 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2020-17516 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2021:2554-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2021:1962-1 · Vendor Advisory
- https://bugzilla.suse.com/1185836 · Note
- https://bugzilla.suse.com/1181689 · Note
- https://suse.com/security/cve/CVE-2017-11481 · Note
- https://suse.com/support/update/announcement/2021/suse-su-20212554-1 · Note
- https://bugzilla.suse.com/1048688 · Note
- https://bugzilla.suse.com/1185623 · Note
- https://bugzilla.suse.com/1181828 · Note
- https://suse.com/security/cve/CVE-2021-31542 · Note
- https://suse.com/security/cve/CVE-2020-12052 · Note