CVE-2024-27137: Apache Cassandra: unrestricted deserialization of JMX authentication credentials
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.03062%
CWE
Published
2/4/2025
Updated
2/18/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.cassandra:cassandra-all | maven | >= 5.0-beta1, < 5.0.3 | 5.0.3 |
| org.apache.cassandra:cassandra-all | maven | >= 4.1.0, < 4.1.8 | 4.1.8 |
| org.apache.cassandra:cassandra-all | maven | >= 4.0.2, < 4.0.15 | 4.0.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure JMX/RMI configuration in Java 11 environments. The CassandraDaemon.setupJMX function is central to JMX initialization, and improper security settings here (or in startup scripts like cassandra-env.sh) would allow MITM attacks on the RMI registry. The CVE-2020-13946 precedent shows similar JMX misconfigurations, and the JDK10+ changes to RMI registry handling (e.g., removal of 'com.sun.management.jmxremote.rmi.port' fallback) likely exacerbated the issue. Patches in newer versions (4.0.15+, 4.1.8+, 5.0.3+) likely enforce SSL and authentication parameters in these components.