Vulnerability Description
The default configuration in Apache Cassandra 3.8 through 3.11.1 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. This issue is a regression of CVE-2015-0225. The regression was introduced in https://issues.apache.org/jira/browse/CASSANDRA-12109. The fix for the regression is implemented in https://issues.apache.org/jira/browse/CASSANDRA-14173. This fix is contained in the 3.11.2 release of Apache Cassandra.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Cassandra | >= 3.8, <= 3.11.1 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread.html/bafb9060bbdf958a1c15ba66c68531116fba4a83858
- https://lists.apache.org/thread.html/bafb9060bbdf958a1c15ba66c68531116fba4a83858
FAQ
What is CVE-2018-8016?
CVE-2018-8016 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The default configuration in Apache Cassandra 3.8 through 3.11.1 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via ...
How severe is CVE-2018-8016?
CVE-2018-8016 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-8016?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Cassandra.