Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55039: CWE-347 Improper Verification of Cryptographic Signature in Apache Software Foundation Apache Spark

0
Unknown
VulnerabilityCVE-2025-55039cvecve-2025-55039cwe-347cwe-326
Published: Wed Oct 15 2025 (10/15/2025, 07:19:25 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Spark

Description

This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0. Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes. When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication. This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows. To mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or enable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.

AI-Powered Analysis

AILast updated: 10/15/2025, 07:44:03 UTC

Technical Analysis

Apache Spark, a widely used big data processing framework, has a cryptographic vulnerability identified as CVE-2025-55039 affecting versions before 3.4.4, 3.5.2, and 4.0.0. The issue arises when the network encryption feature (spark.network.crypto.enabled) is enabled but the encryption cipher (spark.network.crypto.cipher) is not explicitly configured. Under these conditions, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides confidentiality but lacks authentication. This absence of authenticated encryption means that an attacker capable of intercepting RPC traffic between Spark nodes can perform bit-flipping attacks on ciphertext, altering messages without detection. Such tampering can compromise the integrity of critical communications like heartbeat signals and application data, potentially causing workflow errors or data corruption. The vulnerability is categorized under CWE-347 (Improper Verification of Cryptographic Signature) and CWE-326 (Inadequate Encryption Strength). To remediate, users should explicitly configure the cipher to AES/GCM/NoPadding, which provides authenticated encryption, or enable SSL encryption (spark.ssl.enabled=true) to secure transport channels robustly. Although no exploits have been reported in the wild, the vulnerability poses a significant risk to the integrity of distributed Spark operations, especially in environments where network attackers can intercept traffic.

Potential Impact

For European organizations relying on Apache Spark for big data analytics and distributed computing, this vulnerability could lead to undetected manipulation of inter-node communications. This compromises data integrity and may disrupt critical data processing workflows, potentially affecting decision-making and operational continuity. Industries such as finance, telecommunications, healthcare, and government agencies using Spark clusters could face risks of data corruption or workflow failures. The man-in-the-middle attack vector requires network access, so organizations with less secure internal networks or exposed cluster communications are at higher risk. The lack of authentication in encryption can also undermine compliance with European data protection regulations like GDPR, which mandate data integrity and security. Additionally, the potential for subtle data manipulation without detection could lead to erroneous analytics outcomes, impacting business intelligence and operational decisions.

Mitigation Recommendations

European organizations should immediately audit their Apache Spark configurations to verify if spark.network.crypto.enabled is set to true and whether spark.network.crypto.cipher is explicitly configured. If encryption is enabled without specifying the cipher, they must update the configuration to use AES/GCM/NoPadding to ensure authenticated encryption. Alternatively, enabling SSL encryption by setting spark.ssl.enabled to true provides stronger transport security and should be preferred where feasible. Organizations should also plan to upgrade to patched Spark versions 3.4.4, 3.5.2, or 4.0.0 or later, which address this vulnerability. Network segmentation and strict access controls should be enforced to limit the possibility of man-in-the-middle attacks on RPC traffic. Monitoring for unusual network activity and integrity checks on Spark workflows can help detect exploitation attempts. Finally, integrating cryptographic best practices and regular security reviews into Spark deployment lifecycles will reduce future risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-08-06T00:27:38.654Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ef4d40cae19e7fe9244039

Added to database: 10/15/2025, 7:29:04 AM

Last enriched: 10/15/2025, 7:44:03 AM

Last updated: 10/15/2025, 1:28:44 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats