First published: Wed Aug 31 2022(Updated: )
Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15. Use of 1.15 on Java 11 will automatically protect JMX over RMI against deserialization attacks. This should have no impact on performance since it only affects JMX/RMI which Gfsh uses to communicate with the JMX Manager which is hosted on a Locator.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Geode | <=1.12.2 | |
Apache Geode | >=1.13.0<=1.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37022 is a vulnerability that affects Apache Geode versions up to 1.12.2 and 1.13.2.
CVE-2022-37022 has a severity score of 8.8 (high).
CVE-2022-37022 allows for a deserialization of untrusted data flaw when using JMX over RMI on Java 11 in Apache Geode versions up to 1.12.2 and 1.13.2.
To protect against CVE-2022-37022, you should upgrade to Apache Geode 1.15 and use it on Java 11.
You can find more information about CVE-2022-37022 at the following reference link: [CVE-2022-37022](https://lists.apache.org/thread/kr1y4l9752g1ww1shnmh8dbfjq785k4m).