Improper Certificate Validation The advisory has been revoked - it doesn't affect any version of package io.netty:netty-handler Open this link in a new tab

    Threat Intelligence

    0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-IONETTY-1042268
  • published 22 Nov 2023
  • disclosed 19 Nov 2020
  • credit Unknown

How to fix?

There is no fixed version for io.netty:netty-handler.


This was deemed not a vulnerability.


io.netty:netty-handler is a library that provides an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Affected versions of this package are vulnerable to Improper Certificate Validation. This security issue occurs as the Hot Rod client does not enable hostname validation when using TLS, possibly resulting in a man-in-the-middle (MITM) attack.