// For flags

CVE-2022-34917

Unauthenticated clients may cause OutOfMemoryError on Apache Kafka Brokers

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions.

Se ha identificado una vulnerabilidad de seguridad en Apache Kafka. Afecta a todas las versiones desde la 2.8.0. La vulnerabilidad permite a clientes maliciosos no autenticados asignar grandes cantidades de memoria en los brokers. Esto puede conllevar a que los brokers sufran una OutOfMemoryException y causar una denegación de servicio. Ejemplos de escenarios: - Cluster Kafka sin autenticación: Cualquier cliente capaz de establecer una conexión de red con un broker puede desencadenar el problema. - Clúster Kafka con autenticación SASL: Cualquier cliente capaz de establecer una conexión de red con un broker, sin necesidad de credenciales SASL válidas, puede desencadenar el problema. - Clúster Kafka con autenticación TLS: Sólo los clientes capaces de autenticarse con éxito por medio de TLS pueden desencadenar el problema. REcomendamos a usuarios actualizar las instalaciones de Kafka a una de las versiones 3.2.3, 3.1.2, 3.0.2, 2.8.2

A flaw was found in Apache Kafka that allows malicious unauthenticated clients to allocate large amounts of memory on brokers, which could lead to an Out Of Memory Exception, causing a denial of service. Various authentication methods were affected in different degrees. In Kafka clusters without authentication, any client able to connect to a broker could trigger the issue. In Kafka clusters with SASL authentication, any client able to connect to a broker without the need for valid SASL credentials could trigger the issue. Lastly, in Kafka clusters with TLS authentication, only clients able to successfully authenticate via TLS could trigger the issue.

*Credits: Apache Kafka would like to thank Mickael Maison, Tom Bentley and Daniel Collins for reporting this issue.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-04 CVE Reserved
  • 2022-09-20 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-09-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
  • CWE-789: Memory Allocation with Excessive Size Value
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Kafka
Search vendor "Apache" for product "Kafka"
>= 2.8.0 < 2.8.2
Search vendor "Apache" for product "Kafka" and version " >= 2.8.0 < 2.8.2"
-
Affected
Apache
Search vendor "Apache"
Kafka
Search vendor "Apache" for product "Kafka"
>= 3.0.0 < 3.0.2
Search vendor "Apache" for product "Kafka" and version " >= 3.0.0 < 3.0.2"
-
Affected
Apache
Search vendor "Apache"
Kafka
Search vendor "Apache" for product "Kafka"
>= 3.1.0 < 3.1.2
Search vendor "Apache" for product "Kafka" and version " >= 3.1.0 < 3.1.2"
-
Affected
Apache
Search vendor "Apache"
Kafka
Search vendor "Apache" for product "Kafka"
>= 3.2.0 < 3.2.3
Search vendor "Apache" for product "Kafka" and version " >= 3.2.0 < 3.2.3"
-
Affected