Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-31136
HistoryMay 09, 2023 - 1:37 p.m.

CVE-2023-31136 PostgresNIO processes unencrypted bytes from man-in-the-middle

2023-05-0913:37:38
CWE-522
GitHub_M
www.cve.org
1
cve-2023-31136
postgresnio
tls
encryption
security

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%

PostgresNIO is a Swift client for PostgreSQL. Any user of PostgresNIO prior to version 1.14.2 connecting to servers with TLS enabled is vulnerable to a man-in-the-middle attacker injecting false responses to the client’s first few queries, despite the use of TLS certificate verification and encryption. The vulnerability is addressed in PostgresNIO versions starting from 1.14.2. There are no known workarounds for unpatched users.

CNA Affected

[
  {
    "vendor": "vapor",
    "product": "postgres-nio",
    "versions": [
      {
        "version": "< 1.14.2",
        "status": "affected"
      }
    ]
  }
]

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%

Related for CVELIST:CVE-2023-31136