Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2025-55039

Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-326 Fortaleza de cifrado inadecuada
Fecha de publicación:
15/10/2025
Última modificación:
04/11/2025

Descripción

*** Pendiente de traducción *** This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0.<br /> <br /> <br /> <br /> Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.<br /> <br /> When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.<br /> <br /> This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.<br /> <br /> <br /> To mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or<br /> <br /> enable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.

Productos y versiones vulnerables

CPE Desde Hasta
cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:* 3.4.4 (excluyendo)
cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:* 3.5.0 (incluyendo) 3.5.2 (excluyendo)