CVE-2020-25694

Severity CVSS v4.0:
Pending analysis
Type:
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Publication date:
16/11/2020
Last modified:
19/10/2022

Description

A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 9.5.24 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 9.6.0 (including) 9.6.20 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 10.0 (including) 10.15 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 11.0 (including) 11.10 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 12.0 (including) 12.5 (excluding)
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* 13.0 (including) 13.1 (excluding)
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*