First published: Mon Jun 08 2020(Updated: )
Couchbase Server Java SDK before 2.7.1.1 allows a potential attacker to forge an SSL certificate and pose as the intended peer. An attacker can leverage this flaw by crafting a cryptographically valid certificate that will be accepted by Java SDK's Netty component due to missing hostname verification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Couchbase Couchbase Server Java Sdk | >=1.7.1<2.7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9040 is a vulnerability in the Couchbase Server Java SDK that allows an attacker to forge an SSL certificate and pose as the intended peer.
An attacker can exploit CVE-2020-9040 by crafting a cryptographically valid certificate that will be accepted by Java SDK's Netty component due to missing hostname verification.
CVE-2020-9040 has a severity rating of 7.5 (High).
The affected software is Couchbase Server Java SDK versions between 1.7.1 and 2.7.1.1.
To fix CVE-2020-9040, it is recommended to upgrade to Couchbase Server Java SDK version 2.7.1.1 or later.