CVE-2025-12383
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-11-18
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | jersey | 2.45 |
| eclipse | jersey | 3.1.9 |
| eclipse | jersey | 3.0.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in certain versions of Eclipse Jersey (2.45, 3.0.16, 3.1.9) that can cause the system to ignore important SSL configurations such as mutual authentication, custom key/trust stores, and other security settings. While it may normally result in SSLHandshakeException errors, under specific conditions it can lead to trusting insecure servers without proper verification.
How can this vulnerability impact me? :
The vulnerability can impact you by causing your application to unintentionally trust insecure servers, potentially exposing your communications to man-in-the-middle attacks or other security breaches. This undermines the security guarantees provided by SSL/TLS, possibly leading to unauthorized access or data interception.