Fabric Chaincode Java
by Hyperledger
Source repositories
CVEs (1)
| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2026-45581 | 0.00 | — | — | May 19, 2026 | When chaincode is deployed in chaincode-as-a-service mode with TLS enabled, the chaincode server INFO level logging includes the TLS private key password in plaintext. An attacker with access to the chaincode server logs could recover the TLS private key password. If the attacker can also obtain the TLS private key, they could impersonate the chaincode server. ### Recommendation - Update to the fixed version of the chaincode runtime. - Redact or remove existing logs that contain the TLS private key password. - Change the TLS private key password. ### Mitigation Impacted deployments can mitigate the vulnerability by restricting the logging level to WARNING or higher so that INFO level logs are not written. |
- CVE-2026-45581May 19, 2026risk 0.00cvss —epss —
When chaincode is deployed in chaincode-as-a-service mode with TLS enabled, the chaincode server INFO level logging includes the TLS private key password in plaintext. An attacker with access to the chaincode server logs could recover the TLS private key password. If the attacker can also obtain the TLS private key, they could impersonate the chaincode server. ### Recommendation - Update to the fixed version of the chaincode runtime. - Redact or remove existing logs that contain the TLS private key password. - Change the TLS private key password. ### Mitigation Impacted deployments can mitigate the vulnerability by restricting the logging level to WARNING or higher so that INFO level logs are not written.