The GeoIP processor and Kafka source and buffer were using the deprecated "SSL" protocol identifier when creating SSL contexts, potentially allowing the use of insecure SSL protocols instead of modern TLS versions.
Multiple Data Prepper plugins used SSLContext.getInstance("SSL")
which could potentially allow the use of deprecated SSL protocols (SSLv2, SSLv3) that have known security vulnerabilities. While modern Java implementations typically default to secure TLS versions even with the "SSL" identifier, explicitly using "TLS" ensures that only secure TLS protocols are negotiated.
The affected components were:
GeoIP Processor: The DBSource.initiateSSL()
method used for downloading GeoIP databases from external sources
Kafka Plugin: Both CustomClientSslEngineFactory
and InsecureSslEngineFactory
classes used for Kafka client connections
This could potentially allow connections to negotiate weaker SSL protocols instead of enforcing modern TLS versions, reducing the security of data transmission.
Data Prepper 2.12.2 contains a fix for this issue.
If upgrading is not immediately possible:
{ "severity": "MODERATE", "nvd_published_at": null, "cwe_ids": [ "CWE-295" ], "github_reviewed": true, "github_reviewed_at": "2025-10-15T20:37:29Z" }