### [CVE-2019-14887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14887) ![](https://img.shields.io/static/v1?label=Product&message=wildfly&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%207.2.0.GA%2C%207.2.3.GA%2C%207.2.5.CR2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-757&color=brighgreen) ### Description A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/chnzzh/OpenSSL-CVE-lib