CVE-2025-55039
Severity CVSS v4.0:
Pending analysis
Type:
CWE-326
Inadequate Encryption Strength
Publication date:
15/10/2025
Last modified:
16/10/2025
Description
This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0.<br />
<br />
<br />
<br />
Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.<br />
<br />
When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.<br />
<br />
This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.<br />
<br />
<br />
To mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or<br />
<br />
enable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM