First published: Tue May 30 2023(Updated: )
A vulnerability was found in quarkus-core. This vulnerability occurs because the TLS protocol configured with quarkus.http.ssl.protocols is not enforced, and the client can force the selection of the weaker supported TLS protocol.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Build Of Quarkus | <2.13.8 | |
maven/io.quarkus:quarkus-core | <2.16.8.Final | 2.16.8.Final |
redhat/quarkus | <2.13.8 | 2.13.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this quarkus-core vulnerability is CVE-2023-2974.
The severity of CVE-2023-2974 is high with a CVSS score of 8.1.
This vulnerability occurs because the TLS protocol configured with quarkus.http.ssl.protocols is not enforced, and the client can force the selection of the weaker supported TLS protocol.
The affected software includes quarkus-core versions up to, but not including, version 2.13.8 and Redhat Build Of Quarkus up to, but not including, version 2.13.8.
You can find more information about CVE-2023-2974 on the Red Hat Security Advisory RHSA-2023:3809, the Red Hat CVE page for CVE-2023-2974, and the Red Hat Bugzilla page for bug ID 2211026.