CVE-2019-10099
Description
Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Spark prior to 2.3.3 fails to encrypt user data written to local disk despite enabling spark.io.encryption, exposing cached blocks, RDDs, and UDF data.
Vulnerability
Overview
CVE-2019-10099 affects Apache Spark versions before 2.3.3. The issue is that user data is written to local disk without encryption even when the configuration spark.io.encryption.enabled=true is set [1]. This occurs in specific operations: cached blocks that are evicted to disk (controlled by spark.maxRemoteBlockSizeFetchToMem), during parallelize in SparkR, during broadcast and parallelize in PySpark, and when using Python UDFs [1]. The root cause is that the encryption setting is not consistently applied to all disk write paths.
Exploitation
Prerequisites
The vulnerability requires an attacker to have access to the local disk of the Spark worker nodes. In shared or multi-tenant environments, an adversary with local file system access (or ability to read from disk after the data is written) could potentially read unencrypted cached blocks, broadcast variables, and intermediate data from Python UDFs [2]. No network-level attack is necessary; the attacker must be able to read the filesystem or memory of the Spark worker.
Impact
An attacker who gains access to the local disk can recover sensitive user data that was intended to be encrypted. This includes cached RDDs, broadcast data, and temporary files created during PySpark and SparkR operations. The lack of encryption undermines compliance with data protection requirements and exposes confidential information [1].
Mitigation
Users should upgrade to Apache Spark 2.3.3 or later, which ensures that encryption is applied consistently to all disk writes when spark.io.encryption.enabled=true is set [1]. For environments that cannot upgrade immediately, consider restricting local disk access on worker nodes or using encrypted file systems as a workaround. No evidence of active exploitation in the wild has been reported at the time of disclosure.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.spark:spark-core_2.11Maven | < 2.3.3 | 2.3.3 |
pysparkPyPI | < 2.3.3 | 2.3.3 |
Affected products
3- ghsa-coords2 versions
< 2.3.3+ 1 more
- (no CPE)range: < 2.3.3
- (no CPE)range: < 2.3.3
- Apache/Apache Sparkv5Range: 2.3.2 and below
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-fp5j-3fpf-mhj5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-10099ghsaADVISORY
- github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-114.yamlghsaWEB
- lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e%40%3Cuser.spark.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae%40%3Ccommits.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3EghsaWEB
News mentions
0No linked articles in our index yet.