RHEL 8 : Red Hat JBoss Enterprise Application Platform 8.0.12 (RHSA-2026:3889)

critical Nessus Plugin ID 301159

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat JBoss Enterprise Application Platform 8.0.12.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:3889 advisory.

Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.12 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.11, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.12 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

* undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF [eap-8.0.z] (CVE-2025-12543)

* undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)

* undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-8.0.z] (CVE-2024-3884)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat JBoss Enterprise Application Platform 8.0.12 package based on the guidance in RHSA-2026:3889.

See Also

https://access.redhat.com/security/updates/classification/#important

http://www.nessus.org/u?451267bf

https://access.redhat.com/articles/7120566

https://bugzilla.redhat.com/show_bug.cgi?id=2392306

https://bugzilla.redhat.com/show_bug.cgi?id=2275287

https://bugzilla.redhat.com/show_bug.cgi?id=2408784

https://access.redhat.com/errata/RHSA-2026:3889

http://www.nessus.org/u?01d57b37

https://issues.redhat.com/browse/JBEAP-31073

https://issues.redhat.com/browse/JBEAP-31251

https://issues.redhat.com/browse/JBEAP-31325

https://issues.redhat.com/browse/JBEAP-31343

https://issues.redhat.com/browse/JBEAP-31357

https://issues.redhat.com/browse/JBEAP-31397

https://issues.redhat.com/browse/JBEAP-31420

https://issues.redhat.com/browse/JBEAP-31438

https://issues.redhat.com/browse/JBEAP-31446

https://issues.redhat.com/browse/JBEAP-31453

https://issues.redhat.com/browse/JBEAP-31566

https://issues.redhat.com/browse/JBEAP-31579

https://issues.redhat.com/browse/JBEAP-31596

https://issues.redhat.com/browse/JBEAP-31679

https://issues.redhat.com/browse/JBEAP-31708

https://issues.redhat.com/browse/JBEAP-31712

http://www.nessus.org/u?8ab882e0

Plugin Details

Severity: Critical

ID: 301159

File Name: redhat-RHSA-2026-3889.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/6/2026

Updated: 3/6/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 9.7

Temporal Score: 7.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:P

CVSS Score Source: CVE-2025-12543

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:eap8-xsom, p-cpe:/a:redhat:enterprise_linux:eap8-slf4j-jboss-logmanager, p-cpe:/a:redhat:enterprise_linux:eap8-guava, p-cpe:/a:redhat:enterprise_linux:eap8-guava-libraries, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-jxc, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-runtime, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:eap8-rngom, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-xjc, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-pg, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle, p-cpe:/a:redhat:enterprise_linux:eap8-undertow, p-cpe:/a:redhat:enterprise_linux:eap8-codemodel, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-pkix, p-cpe:/a:redhat:enterprise_linux:eap8-jcip-annotations, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-jmail, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-util, p-cpe:/a:redhat:enterprise_linux:eap8-txw2, p-cpe:/a:redhat:enterprise_linux:eap8-relaxng-datatype, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-core, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-prov

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/5/2026

Vulnerability Publication Date: 9/2/2025

Reference Information

CVE: CVE-2024-3884, CVE-2025-12543, CVE-2025-9784

CWE: 20, 770

IAVA: 2025-A-0897-S, 2026-A-0028

RHSA: 2026:3889