CVE-2021-38296
HIGHApache Spark <3.1.2 - Info Disclosure
Title source: llmDescription
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later
Scores
CVSS v3
7.5
EPSS
0.0085
EPSS Percentile
74.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Classification
CWE
CWE-294
Status
published
Affected Products (5)
apache/spark
< 3.1.3
oracle/financial_services_crime_and_compliance_management_studio
oracle/financial_services_crime_and_compliance_management_studio
org.apache.spark/spark-core
< 3.1.3Maven
pypi/pyspark
< 3.1.3PyPI
Timeline
Published
Mar 10, 2022
Tracked Since
Feb 18, 2026