Skip to main content

CVE-2021-45447: CWE-319 Cleartext Transmission of Sensitive Information in Hitachi Vantara Pentaho Business Analytics Server

High
VulnerabilityCVE-2021-45447cvecve-2021-45447cwe-319
Published: Wed Nov 02 2022 (11/02/2022, 14:56:01 UTC)
Source: CVE
Vendor/Project: Hitachi Vantara
Product: Pentaho Business Analytics Server

Description

Hitachi Vantara Pentaho Business Analytics Server versions before 9.3.0.0, 9.2.0.2 and 8.3.0.25 with the Data Lineage feature enabled transmits database passwords in clear text.   The transmission of sensitive data in clear text allows unauthorized actors with access to the network to sniff and obtain sensitive information that can be later used to gain unauthorized access.

AI-Powered Analysis

AILast updated: 06/26/2025, 01:28:52 UTC

Technical Analysis

CVE-2021-45447 is a high-severity vulnerability affecting Hitachi Vantara's Pentaho Business Analytics Server versions prior to 9.3.0.0, 9.2.0.2, and 8.3.0.25 when the Data Lineage feature is enabled. The core issue is the cleartext transmission of sensitive information, specifically database passwords, over the network. This vulnerability is classified under CWE-319, which pertains to the cleartext transmission of sensitive data. When the Data Lineage feature is active, the server transmits database credentials without encryption, exposing them to interception by unauthorized actors who have network access. An attacker who can sniff network traffic can capture these credentials and subsequently use them to gain unauthorized access to backend databases or other integrated systems. The vulnerability does not require authentication or user interaction to be exploited, but it does require network access to the affected system's communications. The CVSS v3.1 base score is 7.7, indicating a high severity, with vector metrics AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H. This means the attack vector is network-based, requires high attack complexity, no privileges or user interaction, and impacts integrity and availability significantly, with a low impact on confidentiality. No known exploits are reported in the wild, and no official patches are linked in the provided data, though fixed versions are indicated. The vulnerability poses a risk primarily through the exposure of database credentials, which can lead to further compromise of data integrity and availability within the affected environment.

Potential Impact

For European organizations using affected versions of Pentaho Business Analytics Server with the Data Lineage feature enabled, this vulnerability presents a significant risk. The exposure of database passwords in cleartext can lead to unauthorized access to critical databases, potentially resulting in data manipulation, deletion, or disruption of business analytics services. This can affect decision-making processes, reporting accuracy, and operational continuity. Industries relying heavily on data analytics, such as finance, manufacturing, healthcare, and telecommunications, could face operational disruptions and regulatory compliance issues, especially under GDPR mandates concerning data protection. The vulnerability could also be leveraged as a foothold for lateral movement within corporate networks, increasing the risk of broader compromise. Since the attack requires network access, organizations with less segmented or poorly secured internal networks are particularly vulnerable. The lack of user interaction or authentication requirements lowers the barrier for exploitation once network access is obtained, increasing the threat level. Additionally, the potential impact on data integrity and availability could disrupt critical business functions and erode trust in analytics outputs.

Mitigation Recommendations

1. Upgrade to fixed versions of Pentaho Business Analytics Server (9.3.0.0, 9.2.0.2, or 8.3.0.25 and later) as soon as they become available from Hitachi Vantara. 2. If immediate patching is not possible, disable the Data Lineage feature to prevent the cleartext transmission of database credentials. 3. Implement network segmentation and strict access controls to limit which systems and users can access the Pentaho server network traffic, reducing the risk of credential interception. 4. Deploy network-level encryption such as VPNs or TLS tunnels around the Pentaho server communications to protect data in transit, especially if the product does not natively encrypt these transmissions. 5. Monitor network traffic for unusual or unauthorized access attempts to the Pentaho server or backend databases, using intrusion detection systems with signatures or heuristics tuned for this environment. 6. Conduct regular audits of database credentials and rotate passwords frequently to limit the window of opportunity for attackers who may have intercepted credentials. 7. Employ endpoint security controls and network monitoring to detect and prevent unauthorized sniffing tools or man-in-the-middle attacks within the corporate network. 8. Educate IT and security teams about this specific vulnerability to ensure rapid response and awareness of the risks associated with the Data Lineage feature.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HITVAN
Date Reserved
2021-12-21T05:57:40.703Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb89c

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 1:28:52 AM

Last updated: 7/26/2025, 12:33:36 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats