Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-8172

CVE-2020-8172: Node.js TLS Auth Bypass Vulnerability

CVE-2020-8172 is a TLS session reuse flaw in Node.js that allows attackers to bypass host certificate verification. This article covers the technical details, affected versions, security impact, and mitigation.

Published: March 4, 2026

CVE-2020-8172 Overview

CVE-2020-8172 is a certificate validation bypass vulnerability affecting Node.js applications that utilize TLS session reuse. The flaw allows attackers to bypass host certificate verification when TLS sessions are reused, potentially enabling man-in-the-middle attacks against Node.js applications that rely on certificate validation for secure communications.

When a Node.js application connects to a server using TLS and the session is later reused for a connection to a different host, the certificate verification for the new host may be bypassed. This occurs because the cached TLS session does not properly validate that the certificate presented matches the intended destination host.

Critical Impact

Attackers can potentially intercept or modify encrypted communications between Node.js applications and backend services by exploiting the TLS session reuse mechanism to bypass certificate verification.

Affected Products

  • Node.js versions prior to 12.18.0
  • Node.js versions prior to 14.4.0
  • Oracle Banking Extensibility Workbench 14.3.0 and 14.4.0
  • Oracle Blockchain Platform
  • Oracle GraalVM Enterprise 19.3.2 and 20.1.0
  • Oracle MySQL Cluster

Discovery Timeline

  • June 8, 2020 - CVE-2020-8172 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2020-8172

Vulnerability Analysis

This vulnerability stems from improper certificate validation (CWE-295) in Node.js's TLS implementation when session reuse is enabled. TLS session reuse is a performance optimization that allows clients to resume previous TLS sessions without performing a full handshake. However, the Node.js implementation failed to properly verify that the server certificate presented during session resumption matches the intended destination host.

The attack requires network access and the ability to intercept TLS traffic. When successful, an attacker can compromise both confidentiality and integrity of communications, though the attack complexity is high as it requires specific conditions to be met including control over network traffic and timing of TLS session resumption.

Root Cause

The root cause is improper certificate validation during TLS session resumption. When Node.js reuses a TLS session, it may accept a certificate that was valid for the original connection but is not valid for the current destination host. This violates the fundamental security assumption that certificate validation ensures you are communicating with the intended server.

The vulnerable behavior occurs because the session cache lookup does not properly bind the cached session to the specific hostname, allowing a session established with one host to be reused for a connection to a different host without re-validating the certificate chain.

Attack Vector

The attack exploits the network-based TLS session reuse mechanism. An attacker positioned to perform a man-in-the-middle attack can:

  1. Allow an initial legitimate TLS connection to establish and cache a session
  2. When the victim application attempts to connect to a different host
  3. Present the cached session from the first connection
  4. The application accepts the connection without proper certificate validation for the new host
  5. The attacker can now intercept or modify traffic intended for the second host

The vulnerability is particularly dangerous in microservices architectures where Node.js applications frequently connect to multiple backend services using TLS.

Detection Methods for CVE-2020-8172

Indicators of Compromise

  • Unusual TLS session resumption patterns in network traffic logs
  • Certificate mismatch warnings that may have been suppressed or ignored
  • Unexpected connections from Node.js applications to unintended hosts
  • Network anomalies suggesting man-in-the-middle positioning

Detection Strategies

  • Monitor TLS handshake patterns for abnormal session resumption behavior
  • Implement network intrusion detection rules to identify potential MITM attacks
  • Audit Node.js application logs for TLS connection anomalies
  • Review network traffic for certificate chain inconsistencies during TLS resumption

Monitoring Recommendations

  • Enable verbose TLS logging in Node.js applications to capture session reuse events
  • Deploy network monitoring to detect potential MITM attack positioning
  • Monitor for connections to unexpected IP addresses from Node.js services
  • Implement certificate transparency monitoring for your organization's certificates

How to Mitigate CVE-2020-8172

Immediate Actions Required

  • Upgrade Node.js to version 12.18.0 or later for the 12.x release line
  • Upgrade Node.js to version 14.4.0 or later for the 14.x release line
  • Apply Oracle Critical Patch Updates if using affected Oracle products
  • Review applications for TLS session reuse configurations

Patch Information

Node.js released security patches in June 2020 addressing this vulnerability. The fix ensures proper certificate validation occurs even when TLS sessions are reused. Official patch information is available through the Node.js Security Releases Blog.

For Oracle products, patches are available through multiple Critical Patch Updates:

  • Oracle CPU July 2020
  • Oracle CPU October 2020
  • Oracle CPU January 2021
  • Oracle CPU April 2022

Additional advisories are available from Gentoo GLSA 202101-07 and NetApp Security Advisory NTAP-20200625-0002.

Workarounds

  • Disable TLS session reuse in Node.js applications if patching is not immediately possible
  • Implement additional certificate pinning at the application level
  • Use network segmentation to limit exposure of vulnerable Node.js applications
  • Deploy reverse proxies with proper certificate validation in front of vulnerable applications
bash
# Configuration example - Disable TLS session reuse in Node.js
# Set environment variable to disable session caching
export NODE_TLS_REJECT_UNAUTHORIZED=1

# In application code, disable session caching
# tls.connect({ rejectUnauthorized: true, session: null })

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechNodejs

  • SeverityHIGH

  • CVSS Score7.4

  • EPSS Probability0.61%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-295
  • Technical References
  • HackerOne Report #811502

  • Gentoo GLSA 202101-07

  • NetApp Security Advisory NTAP-20200625-0002

  • Oracle Security Alert CPU July 2021
  • Vendor Resources
  • Node.js Vulnerability Blog Post

  • Oracle Security Alert CPU April 2022

  • Oracle Security Alert CPU January 2021

  • Oracle Security Alert CPU July 2020

  • Oracle Security Alert CPU October 2020
  • Related CVEs
  • CVE-2023-38552: Node.js Authorization Bypass Vulnerability

  • CVE-2023-32002: Node.js Auth Bypass Vulnerability

  • CVE-2023-32006: Node.js Policy Bypass Vulnerability

  • CVE-2021-44532: Node.js Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English