Skip to main content

CVE-2025-26795: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Apache Software Foundation Apache IoTDB JDBC driver

High
VulnerabilityCVE-2025-26795cvecve-2025-26795cwe-200cwe-532
Published: Wed May 14 2025 (05/14/2025, 10:43:05 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache IoTDB JDBC driver

Description

Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Information into Log File vulnerability in Apache IoTDB JDBC driver. This issue affects iotdb-jdbc: from 0.10.0 through 1.3.3, from 2.0.1-beta before 2.0.2. Users are recommended to upgrade to version 2.0.2 and 1.3.4, which fix the issue.

AI-Powered Analysis

AILast updated: 07/06/2025, 07:13:05 UTC

Technical Analysis

CVE-2025-26795 is a high-severity vulnerability affecting the Apache IoTDB JDBC driver, specifically versions from 0.10.0 through 1.3.3 and 2.0.1-beta before 2.0.2. The vulnerability involves the exposure of sensitive information to unauthorized actors, classified under CWE-200 (Exposure of Sensitive Information) and CWE-532 (Insertion of Sensitive Information into Log File). The issue arises because the JDBC driver improperly handles sensitive data, potentially logging confidential information in an insecure manner. This can lead to unauthorized disclosure if log files are accessed by malicious actors. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N), meaning an attacker can exploit it over the network with low complexity and no privileges. The impact is primarily on confidentiality, with no direct effect on integrity or availability. The Apache Software Foundation has addressed this issue in versions 2.0.2 and 1.3.4, and users are strongly advised to upgrade to these versions to mitigate the risk. No known exploits are currently reported in the wild, but the high CVSS score of 7.5 reflects the significant risk posed by this vulnerability if left unpatched.

Potential Impact

For European organizations, the exposure of sensitive information via the Apache IoTDB JDBC driver can have serious consequences, especially for industries relying on IoT data management such as manufacturing, energy, smart cities, and healthcare. Unauthorized access to sensitive data could lead to breaches of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, leaked information could facilitate further attacks or industrial espionage. Given the driver’s role in database connectivity for IoTDB, compromised confidentiality could undermine trust in critical infrastructure systems and IoT deployments. The fact that exploitation requires no authentication or user interaction increases the risk of widespread impact, particularly in environments where the vulnerable driver is exposed to untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

Organizations should immediately upgrade affected Apache IoTDB JDBC driver versions to 2.0.2 or 1.3.4 as released by the Apache Software Foundation. Beyond patching, it is crucial to audit and restrict access to log files to prevent unauthorized reading of sensitive information. Implement strict access controls and monitoring on systems running IoTDB and its JDBC driver. Network segmentation should be enforced to limit exposure of database connectivity components to untrusted networks. Additionally, review logging configurations to ensure sensitive data is not unnecessarily logged. Employ intrusion detection systems to monitor for anomalous access patterns targeting IoTDB services. Finally, incorporate this vulnerability into regular vulnerability management and incident response plans to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-02-14T10:32:51.543Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb4ac

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/6/2025, 7:13:05 AM

Last updated: 8/13/2025, 7:29:22 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats