Miggo Logo

CVE-2024-27137: Apache Cassandra: unrestricted deserialization of JMX authentication credentials

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.03062%
Published
2/4/2025
Updated
2/18/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.cassandra:cassandra-allmaven>= 5.0-beta1, < 5.0.35.0.3
org.apache.cassandra:cassandra-allmaven>= 4.1.0, < 4.1.84.1.8
org.apache.cassandra:cassandra-allmaven>= 4.0.2, < 4.0.154.0.15

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure JMX/RMI configuration in Java 11 environments. The CassandraDaemon.setupJMX function is central to JMX initialization, and improper security settings here (or in startup scripts like cassandra-env.sh) would allow MITM attacks on the RMI registry. The CVE-2020-13946 precedent shows similar JMX misconfigurations, and the JDK10+ changes to RMI registry handling (e.g., removal of 'com.sun.management.jmxremote.rmi.port' fallback) likely exacerbated the issue. Patches in newer versions (4.0.15+, 4.1.8+, 5.0.3+) likely enforce SSL and authentication parameters in these components.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *p**** **ss*n*r* it is possi*l* *or * lo**l *tt**k*r wit*out ****ss to t** *p**** **ss*n*r* pro**ss or *on*i*ur*tion *il*s to m*nipul*t* t** RMI r**istry to p*r*orm * m*n-in-t**-mi**l* *tt**k *n* **ptur* us*r n*m*s *n* p*sswor*s us** to ****ss t**

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* JMX/RMI *on*i*ur*tion in J*v* ** *nvironm*nts. T** `**ss*n*r****mon.s*tupJMX` *un*tion is **ntr*l to JMX initi*liz*tion, *n* improp*r s**urity s*ttin*s **r* (or in st*rtup s*ripts lik* `**ss*n*r*-*nv.s*`) woul* *
CVE-2024-27137: Cassandra JMX Auth Cred Theft | Miggo