<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Found vulnerability in cassandra process in Dynatrace Managed Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Found-vulnerability-in-cassandra-process/m-p/166924#M1671</link>
    <description>&lt;P&gt;Hi AskMe Solutions,&lt;BR /&gt;&lt;BR /&gt;Dynatrace Managed cassandra nodes don't have authentication and authorization enabled. Dynatrace Managed mitigates that risk by automatically putting IP table rules (firewall rules) in place, which make sure that only Dynatrace server nodes are able to access the cassandra port on the cassandra nodes. Cassandra is used only by Dynatrace Managed internally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="context new-line show-merge-tag" aria-hidden="false"&gt;Dynatrace managed creates a dedicated user "dynatrace" in group "dynatrace" that is used for Cassandra. The user dynatrace is non-privileged service user (no console) and is not used for anything other than Dynatrace Managed.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="context new-line show-merge-tag" aria-hidden="false"&gt;&lt;SPAN style="display: none; width: 0px; height: 0px;"&gt;If &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="context new-line show-merge-tag" aria-hidden="false"&gt;If you have further queries about this, I suggest to open a ticket with &lt;A href="https://support.dynatrace.com/" target="_self"&gt;Dynatrace Support&lt;/A&gt;, or chat with a specialist using the in-product live chat function.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 31 May 2021 23:54:07 GMT</pubDate>
    <dc:creator>The_AM</dc:creator>
    <dc:date>2021-05-31T23:54:07Z</dc:date>
    <item>
      <title>Found vulnerability in cassandra process</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Found-vulnerability-in-cassandra-process/m-p/166812#M1670</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From VA scan report, We have founded vulnerability "JMX Authentication Not Enabled on Localhost Interface" that about SSRF attacks or privilege escalation on the cassandra process of Dynatrace managed. So we need to know what we can do on this vulnerability to secure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Dynatrace Askme.&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 07:24:05 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Found-vulnerability-in-cassandra-process/m-p/166812#M1670</guid>
      <dc:creator>AskMe-Solutions</dc:creator>
      <dc:date>2021-05-28T07:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Found vulnerability in cassandra process</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Found-vulnerability-in-cassandra-process/m-p/166924#M1671</link>
      <description>&lt;P&gt;Hi AskMe Solutions,&lt;BR /&gt;&lt;BR /&gt;Dynatrace Managed cassandra nodes don't have authentication and authorization enabled. Dynatrace Managed mitigates that risk by automatically putting IP table rules (firewall rules) in place, which make sure that only Dynatrace server nodes are able to access the cassandra port on the cassandra nodes. Cassandra is used only by Dynatrace Managed internally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="context new-line show-merge-tag" aria-hidden="false"&gt;Dynatrace managed creates a dedicated user "dynatrace" in group "dynatrace" that is used for Cassandra. The user dynatrace is non-privileged service user (no console) and is not used for anything other than Dynatrace Managed.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="context new-line show-merge-tag" aria-hidden="false"&gt;&lt;SPAN style="display: none; width: 0px; height: 0px;"&gt;If &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="context new-line show-merge-tag" aria-hidden="false"&gt;If you have further queries about this, I suggest to open a ticket with &lt;A href="https://support.dynatrace.com/" target="_self"&gt;Dynatrace Support&lt;/A&gt;, or chat with a specialist using the in-product live chat function.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 May 2021 23:54:07 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-Managed-Q-A/Found-vulnerability-in-cassandra-process/m-p/166924#M1671</guid>
      <dc:creator>The_AM</dc:creator>
      <dc:date>2021-05-31T23:54:07Z</dc:date>
    </item>
  </channel>
</rss>

