redhat wildfly CVE-2018-14627 is a vulnerability in Red Hat Wildfly
Published on September 4, 2018

The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL transport is required. Servers before this version that are configured with the following setting allow clients to create plaintext connections: <transport-config confidentiality="required" trust-in-target="supported"/>

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Weakness Type

Cleartext Transmission of Sensitive Information

The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. Many communication channels can be "sniffed" by attackers during data transmission. For example, network traffic can often be sniffed by any attacker who has access to a network interface. This significantly lowers the difficulty of exploitation by attackers.


Products Associated with CVE-2018-14627

Want to know whenever a new CVE is published for Red Hat Wildfly? stack.watch will email you.

 

Affected Versions

[UNKNOWN] JBoss/WildFly Version 14.0.0 is affected by CVE-2018-14627

Exploit Probability

EPSS
0.24%
Percentile
46.75%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.