{"api_version":"1","generated_at":"2026-04-22T23:31:37+00:00","cve":"CVE-2022-32531","urls":{"html":"https://cve.report/CVE-2022-32531","api":"https://cve.report/api/cve/CVE-2022-32531.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-32531","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-32531"},"summary":{"title":"CVE-2022-32531","description":"The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2022-12-15 19:15:00","updated_at":"2023-11-07 03:47:00"},"problem_types":["CWE-295"],"metrics":[],"references":[{"url":"https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9","name":"https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-32531","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32531","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"32531","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"bookkeeper","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32531","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"bookkeeper","cpe6":"4.15.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32531","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"bookkeeper","cpe6":"4.15.0","cpe7":"rc0","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-32531","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-295 Improper Certificate Validation","cweId":"CWE-295"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache BookKeeper","version":{"version_data":[{"version_value":"0","version_affected":"="},{"version_value":"4.15.0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9","refsource":"MISC","name":"https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"advisory":"https://github.com/apache/bookkeeper/pull/3310","discovery":"UNKNOWN"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Upgrade to 4.14.6 or to 4.15.1<br>"}],"value":"Upgrade to 4.14.6 or to 4.15.1\n"}]},"nvd":{"publishedDate":"2022-12-15 19:15:00","lastModifiedDate":"2023-11-07 03:47:00","problem_types":["CWE-295"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:bookkeeper:4.15.0:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:bookkeeper:4.15.0:rc0:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:bookkeeper:*:*:*:*:*:*:*:*","versionEndExcluding":"4.14.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}