Improper Certificate Validation The advisory has been revoked - it doesn't affect any version of package io.netty:netty-handler  (opens in a new tab)


Threat Intelligence

EPSS
0.09% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-IONETTY-1042268
  • published22 Nov 2023
  • disclosed19 Nov 2020
  • creditUnknown

Introduced: 19 Nov 2020

CVE-2023-4586  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

There is no fixed version for io.netty:netty-handler.

Amendment

This was deemed not a vulnerability.

Overview

io.netty:netty-handler is a library that provides an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Affected versions of this package are vulnerable to Improper Certificate Validation. This security issue occurs as the Hot Rod client does not enable hostname validation when using TLS, possibly resulting in a man-in-the-middle (MITM) attack.