Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68637: CWE-297 Improper Validation of Certificate with Host Mismatch in Apache Software Foundation Apache Uniffle

0
Critical
VulnerabilityCVE-2025-68637cvecve-2025-68637cwe-297
Published: Wed Jan 07 2026 (01/07/2026, 09:39:04 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Uniffle

Description

CVE-2025-68637 is a critical vulnerability in Apache Uniffle versions prior to 0. 10. 0 where the HTTP client disables hostname verification and trusts all SSL certificates by default. This misconfiguration allows attackers to perform Man-in-the-Middle (MITM) attacks on REST API communications between the Uniffle CLI/client and the Uniffle Coordinator service. The vulnerability has a CVSS score of 9. 1, indicating high severity with potential for complete confidentiality and integrity compromise without requiring authentication or user interaction. Upgrading to version 0. 10. 0 mitigates this issue by enforcing proper certificate validation. European organizations using Apache Uniffle, especially in data-intensive or distributed computing environments, should prioritize patching to prevent interception or manipulation of sensitive data.

AI-Powered Analysis

AILast updated: 01/14/2026, 16:00:57 UTC

Technical Analysis

Apache Uniffle is a distributed data caching system designed to improve data access performance in large-scale computing environments. The vulnerability identified as CVE-2025-68637 stems from an insecure default configuration in the Uniffle HTTP client, which disables hostname verification and trusts all SSL certificates during REST API communications with the Uniffle Coordinator service. This improper validation of certificates (CWE-297) means that an attacker positioned on the network path can impersonate the coordinator service by presenting any SSL certificate, including self-signed or fraudulent ones, without triggering client-side warnings or errors. Consequently, the attacker can intercept, read, or modify sensitive data exchanged between the client and the coordinator, leading to a Man-in-the-Middle (MITM) attack. The vulnerability affects all versions before 0.10.0, and the Apache Software Foundation has addressed the issue in version 0.10.0 by enforcing proper certificate validation and hostname verification. The CVSS 3.1 score of 9.1 reflects the vulnerability's critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity. No known exploits are currently reported in the wild, but the ease of exploitation and severity warrant immediate attention from users of Apache Uniffle.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of data transmitted within distributed computing environments that utilize Apache Uniffle. Potential impacts include unauthorized data disclosure, data tampering, and disruption of data processing workflows. Organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and critical infrastructure operators, could face compliance violations and reputational damage if exploited. The vulnerability could also facilitate lateral movement within networks if attackers leverage intercepted credentials or session tokens. Given the critical CVSS rating and the lack of authentication requirements, the threat surface is broad, especially in environments where network segmentation or encryption is insufficient. The absence of user interaction requirements further increases the risk of automated exploitation. European entities relying on Apache Uniffle for big data analytics, cloud services, or edge computing should consider this vulnerability a high priority for remediation to maintain secure operations and data integrity.

Mitigation Recommendations

The primary mitigation is to upgrade Apache Uniffle to version 0.10.0 or later, where proper SSL certificate validation and hostname verification are enforced by default. Until the upgrade can be applied, organizations should implement network-level protections such as enforcing strict TLS inspection policies, deploying network segmentation to isolate Uniffle components, and using VPNs or secure tunnels to protect REST API traffic. Additionally, administrators should audit existing configurations to ensure no overrides disable hostname verification or trust all certificates. Monitoring network traffic for anomalous SSL certificates or unexpected connections to Uniffle Coordinator services can help detect potential MITM attempts. Incorporating certificate pinning or mutual TLS authentication, if supported, can further harden communications. Finally, organizations should review and update incident response plans to address potential exploitation scenarios involving data interception or manipulation in distributed systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-12-20T12:17:41.989Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695e2cc2a55ed4ed999bf8d1

Added to database: 1/7/2026, 9:52:02 AM

Last enriched: 1/14/2026, 4:00:57 PM

Last updated: 2/6/2026, 8:57:28 AM

Views: 161

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats