Description
A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.
Remediation
References
Related Vulnerabilities
Ruby Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-10933)
WordPress Plugin UpdraftPlus WordPress Backup Cross-Site Request Forgery (1.23.3)
WebLogic CVE-2016-0700 Vulnerability (CVE-2016-0700)
Joomla! Core 2.5.x Denial of Service (2.5.0 - 2.5.9)
WordPress Plugin Facebook Like Box Multiple Vulnerabilities (2.9.1)