CVE-2019-14887
16.03.2020, 15:15
A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.
Vendor | Product | Version |
---|---|---|
redhat | jboss_data_grid | 7.0.0 |
redhat | jboss_enterprise_application_platform | 7.0.0 |
redhat | jboss_fuse | 7.0.0 |
redhat | openshift_application_runtimes | - |
redhat | single_sign-on | 7.0 |
redhat | wildfly | 7.2.0:general_availability |
redhat | wildfly | 7.2.3:general_availability |
redhat | wildfly | 7.2.5:cr2 |
𝑥
= Vulnerable software versions
References