CVE-2025-66524

8.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution on Apache NiFi systems through unsafe Java deserialization in the GetAsanaObject Processor. Attackers can exploit it by injecting malicious objects into the configured cache server, potentially taking full control of affected systems. Only systems running Apache NiFi with the GetAsanaObject Processor enabled and accessible cache servers are vulnerable.

💻 Affected Systems

Products:
  • Apache NiFi
Versions: 1.20.0 through 2.6.0
Operating Systems: All platforms running Apache NiFi
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when GetAsanaObject Processor is enabled and configured with a Distribute Map Cache Client Service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing arbitrary code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Remote code execution leading to service disruption, data exfiltration, or installation of persistent backdoors.

🟢

If Mitigated

Limited impact if cache server access is restricted and network segmentation prevents exploitation.

🌐 Internet-Facing: HIGH if cache server is internet-accessible, as exploitation requires only cache server access.
🏢 Internal Only: MEDIUM if cache server is internal-only, requiring attacker to first gain internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires direct access to the configured cache server but no authentication to NiFi itself. Java deserialization exploits are well-documented and weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apache NiFi 2.7.0

Vendor Advisory: https://lists.apache.org/thread/k9h004ydjg7opdvxr0nfywtzf33z60d7

Restart Required: Yes

Instructions:

1. Download Apache NiFi 2.7.0 from official sources. 2. Stop NiFi service. 3. Backup configuration and data. 4. Install new version. 5. Restart NiFi service. 6. Verify version and functionality.

🔧 Temporary Workarounds

Remove GetAsanaObject Processor

all

Disable or remove the vulnerable processor from the nifi-asana-processors-nar bundle

Remove or disable nifi-asana-processors-nar bundle from NiFi installation

Restrict Cache Server Access

all

Implement network controls to limit access to the Distribute Map Cache Client Service

Configure firewall rules to restrict cache server access to trusted IPs only

🧯 If You Can't Patch

  • Disable GetAsanaObject Processor and remove nifi-asana-processors-nar bundle
  • Implement strict network segmentation and access controls for cache servers

🔍 How to Verify

Check if Vulnerable:

Check if NiFi version is between 1.20.0 and 2.6.0 AND GetAsanaObject Processor is enabled in configuration

Check Version:

nifi.sh status | grep Version or check NiFi web interface

Verify Fix Applied:

Verify NiFi version is 2.7.0 or higher AND GetAsanaObject Processor uses JSON serialization

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java deserialization errors
  • Suspicious cache server connections
  • GetAsanaObject Processor activity anomalies

Network Indicators:

  • Unusual traffic to cache server ports
  • Malformed serialized objects in network traffic

SIEM Query:

source="nifi" AND ("GetAsanaObject" OR "deserialization" OR "cache server")

🔗 References

📤 Share & Export