CVE-2022-37023
MEDIUMApache Geode < 1.15.0 - Insecure Deserialization
Title source: ruleDescription
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-serializable-objects=true" and specifying any user classes that may be serialized/deserialized with "serializable-object-filter". Enabling "validate-serializable-objects" may impact performance.
Scores
CVSS v3
6.5
EPSS
0.0046
EPSS Percentile
63.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (2)
apache/geode
< 1.15.0
org.apache.geode/geode-core
< 1.15.0Maven
Timeline
Published
Aug 31, 2022
Tracked Since
Feb 18, 2026