Community Announcements

Find the latest community announcements

April 2025 Cloudera Customer Advisory: Cloudera’s response to the Apache Parquet vulnerability CVE-2025-30065

avatar
Community Manager

Background:

On April 1, 2025, a critical vulnerability in the parquet-avro module of Apache Parquet (CVE-2025-30065, CVSS score 10.0) was announced.
Cloudera is issuing this advisory to inform customers about affected components and details about the impact this has on Cloudera components. An active investigation of this vulnerability is ongoing with the highest priority, and Cloudera will provide in-depth updates on impacted products and mitigation steps in short order via a separate Technical Service Bulletin (TSB).

Vulnerability Details:

Exploiting this vulnerability is only possible by modifying the accepted schema used for translating Parquet files and subsequently submitting a specifically crafted malicious file.
 
CVE-2025-30065 | Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code.
 
Severity (Critical): CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N

Mitigation:

Until an upgrade with Apache Parquet 1.15.1 or higher is available:
  1. Utilize a File Integrity Monitoring (FIM) solution. This allows administrators to monitor files at the filesystem level and receive alerts on any unexpected or suspicious activity in the schema configuration.
  2. Monitor network activity for any transmission of Parquet files, and alert on any unexpected activity.
  3. Be cautious with Parquet files from unknown or untrusted sources. If possible, do not process files with uncertain origin or that came from outside the organization. 
  4. Ensure that only authorized users have access to endpoints that ingest Parquet files.
For the latest update on this issue, see the corresponding Knowledge Article:
2 REPLIES 2

avatar
New Contributor

Hi,

Thanks for sharing this information.

Could you please let me know how I can check if I am using "apache parquet" on my environment.

My current version in prod cm on 7.7.1 and cloudera runtime is 7.1.7sp2 and test is on CM 7.11.3 and runtime is  7.1.7sp3.plwae let me know if we are safe on this version or let me know in which cloudera manager and runtime version this has been fixed?

avatar
New Contributor

Also please let me know to whome this vulnerability is applicable?