Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

cve-2022-36437
CVE

CVE-2022-36437

Hazelcast connection caching

Description

Impact

The Connection handler in Hazelcast and Hazelcast Jet allows an unauthenticated, remote attacker to access and manipulate data in the cluster with another authenticated connection's identity.

The affected Hazelcast versions are through 3.12.12, 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2.

The affected Hazelcast Jet versions are through 4.5.3.

Patches

Hazelcast Jet (and Enterprise) 4.5.4.

Hazelcast IMDG (and Enterprise)3.12.13

Hazelcast IMDG (and Enterprise) 4.1.10

Hazelcast IMDG (and Enterprise) 4.2.6

Hazelcast Platform (and Enterprise) 5.1.3

Workarounds

There is no known workaround, but setups with TLS and mutual authentication enabled significantly lowers the exploitation risk.

References

https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2022-36437

Base CVSS

9.1

EPSS Score

0.31%

Introduced Version

1.5

Fix Available

5.0.4,5.1.3,3.12.13,4.1.10,4.2.6

Available Patches

Package
CVEs Fixed
Lines of Code Changed

References

No items found.

AppSec for the Software Development Revolution

Endor Labs builds a complete graph of your software estate, so teams can pinpoint and fix critical risks in complex, dependency-rich code—whether it was written by humans or AI.

brightness-increase
moon-01