#VU58114 Missing Encryption of Sensitive Data in PostgreSQL


Published: 2021-11-11

Vulnerability identifier: #VU58114

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-23222

CWE-ID: CWE-311

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
PostgreSQL
Server applications / Database software

Vendor: PostgreSQL Global Development Group

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to the way the libpq process in PostgreSQL handles encrypted connections. A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption. The attacker can exfiltrate the client's password or other confidential data that might be transmitted early in a session.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

PostgreSQL: 14.0, 13.0 - 13.4, 12 - 12.8, 11.0 - 11.13, 10.0 - 10.18, 9.6.0 - 9.6.23


External links
http://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability