CVE-2025-55039
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-326
Fortaleza de cifrado inadecuada
Fecha de publicación:
15/10/2025
Última modificación:
04/11/2025
Descripción
*** Pendiente de traducción *** This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0.<br />
<br />
<br />
<br />
Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.<br />
<br />
When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.<br />
<br />
This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.<br />
<br />
<br />
To mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or<br />
<br />
enable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.
Impacto
Puntuación base 3.x
6.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:* | 3.4.4 (excluyendo) | |
| cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:* | 3.5.0 (incluyendo) | 3.5.2 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



