CVE-2022-37021: Apache Geode vulnerable to Deserialization of Untrusted Data
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.61986%
CWE
Published
9/1/2022
Updated
3/10/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.geode:geode-core | maven | < 1.12.16 | 1.12.16 |
| org.apache.geode:geode-core | maven | >= 1.13.0, < 1.13.5 | 1.13.5 |
| org.apache.geode:geode-core | maven | >= 1.14.0, < 1.14.1 | 1.14.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves insecure deserialization via JMX/RMI in Java 8. Key functions include those initializing JMX services (JmxManager.startJmxManager) and handling RMI deserialization (RemoteFilterChain.readObject). These functions likely lacked serialization filters in vulnerable versions, as the patch introduces a system property to enable filtering. The confidence is medium due to inferred code behavior from vulnerability descriptions and Java RMI/JMX patterns, though exact patch details are unavailable.