{"id":"CVE-2019-14887","details":"A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.","modified":"2026-05-15T12:03:42.711694359Z","published":"2020-03-16T15:15:12.130Z","database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0.0"}],"source":"CPE_FIELD","vendor_product":"redhat:jboss_data_grid"},{"cpes":["cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0.0"}],"source":"CPE_FIELD","vendor_product":"redhat:jboss_enterprise_application_platform"},{"cpes":["cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"7.0.0"}],"source":"CPE_FIELD","vendor_product":"redhat:jboss_fuse"},{"cpes":["cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*"],"vendor_product":"redhat:single_sign-on","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpes":["cpe:2.3:a:redhat:wildfly:7.2.3:general_availability:*:*:*:*:*:*","cpe:2.3:a:redhat:wildfly:7.2.5:cr2:*:*:*:*:*:*"],"vendor_product":"redhat:wildfly","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2.3-general_availability"},{"last_affected":"7.2.5-cr2"}]}]},"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200327-0007/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14887"},{"type":"REPORT","url":"https://issues.redhat.com/browse/JBEAP-17965"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}