From 48e8c20c84586d2860e80e87191299f651ceaaa5 Mon Sep 17 00:00:00 2001 From: miqowhy <38476775+miqowhy@users.noreply.github.com> Date: Tue, 24 Mar 2026 06:59:14 +0100 Subject: [PATCH 1/3] Document new security vulnerability in Apache Spark Added details about CVE-2025-55039 vulnerability in Apache Spark, including severity, affected versions, descriptions, mitigations, and credit. --- security.md | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/security.md b/security.md index 38ee3a6179..1160c2ff7c 100644 --- a/security.md +++ b/security.md @@ -58,6 +58,30 @@ This includes verifying the source, validating integrity, and applying appropria before loading or deploying a model.

Known security issues

+

CVE-2025-55039: Apache Spark: RPC encryption defaults to unauthenticated AES-CTR mode, enabling man-in-the-middle ciphertext modification attacks

+ +Severity: Moderate + +Vendor: The Apache Software Foundation + +Versions Affected: + +- Versions prior to 3.4.4, 3.5.2 and 4.0.0 + +Description: + +Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes. +When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication. +This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows. + +Mitigation: + +- Either configure `spark.network.crypto.cipher` to "AES/GCM/NoPadding" to enable authenticated encryption or enable SSL encryption by setting both `spark.ssl.enabled` and `spark.ssl.rpc.enabled` to "true", which provides stronger transport security. + +Credit: + +- Holden Karau +

CVE-2023-32007: Apache Spark shell command injection vulnerability via Spark UI

From e549f6291ff4323d02a5230346b874911fdb28ea Mon Sep 17 00:00:00 2001 From: miqowhy <38476775+miqowhy@users.noreply.github.com> Date: Wed, 25 Mar 2026 06:21:03 +0100 Subject: [PATCH 2/3] Add new line as suggested by reviewer --- security.md | 1 + 1 file changed, 1 insertion(+) diff --git a/security.md b/security.md index 1160c2ff7c..3e55d9c8ba 100644 --- a/security.md +++ b/security.md @@ -58,6 +58,7 @@ This includes verifying the source, validating integrity, and applying appropria before loading or deploying a model.

Known security issues

+

CVE-2025-55039: Apache Spark: RPC encryption defaults to unauthenticated AES-CTR mode, enabling man-in-the-middle ciphertext modification attacks

Severity: Moderate From 3156117f9666a51d8c32c38da3f01a498bbc09f9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Miko=C5=82aj=20=C5=BBurek?= Date: Wed, 25 Mar 2026 06:55:33 +0100 Subject: [PATCH 3/3] Files modified after local build --- site/security.html | 30 ++++++++++++++++++++++++++++++ site/sitemap.xml | 4 ++-- 2 files changed, 32 insertions(+), 2 deletions(-) diff --git a/site/security.html b/site/security.html index 1166f04a63..043bdbfc22 100644 --- a/site/security.html +++ b/site/security.html @@ -205,6 +205,36 @@

Is loading a machine learning model secure? Who is responsible for model sec

Known security issues

+

CVE-2025-55039: Apache Spark: RPC encryption defaults to unauthenticated AES-CTR mode, enabling man-in-the-middle ciphertext modification attacks

+ +

Severity: Moderate

+ +

Vendor: The Apache Software Foundation

+ +

Versions Affected:

+ + + +

Description:

+ +

Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes. +When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication. +This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.

+ +

Mitigation:

+ + + +

Credit:

+ + +

CVE-2023-32007: Apache Spark shell command injection vulnerability via Spark UI

This CVE is only an update to CVE-2022-33891 to clarify that version 3.1.3 is also diff --git a/site/sitemap.xml b/site/sitemap.xml index f70239e5c9..cdb7dc3ec5 100644 --- a/site/sitemap.xml +++ b/site/sitemap.xml @@ -1201,7 +1201,7 @@ weekly - https://spark.apache.org/graphx/ + https://spark.apache.org/sql/ weekly @@ -1209,7 +1209,7 @@ weekly - https://spark.apache.org/sql/ + https://spark.apache.org/graphx/ weekly