Learn about CVE-2019-10091, a vulnerability in Apache Geode that exposes intra-cluster communication to man-in-the-middle attacks due to TLS hostname verification failure.
Apache Geode TLS hostname verification vulnerability
Understanding CVE-2019-10091
What is CVE-2019-10091?
When Apache Geode enables TLS with ssl-endpoint-identification-enabled set to true, it fails to verify the hostname of entries in the certificate SAN during the SSL handshake, potentially exposing intra-cluster communication to man-in-the-middle attacks.
The Impact of CVE-2019-10091
This vulnerability could compromise the security of intra-cluster communication within Apache Geode deployments, allowing unauthorized access and interception of sensitive data.
Technical Details of CVE-2019-10091
Vulnerability Description
Apache Geode does not perform hostname verification of entries in the certificate SAN during SSL handshake when TLS is enabled with ssl-endpoint-identification-enabled set to true.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability could be exploited by a man-in-the-middle attacker intercepting intra-cluster communication within Apache Geode deployments.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply patches provided by Apache Geode to address the TLS hostname verification vulnerability.