NA

CVE-2022-34917

Published: 20/09/2022 Updated: 22/09/2022
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache kafka

Vendor Advisories

Synopsis Important: Red Hat AMQ Streams 220 release and security update Type/Severity Security Advisory: Important Topic Red Hat AMQ Streams 220 is now available from the Red Hat Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Description The MITRE CVE dictionary describes this issue as: A security vulnerability has been identified in Apache Kafka It affects all releases since 280 The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers This can lead to brokers hitting OutOfMemoryException and causing denial of ...