Description


Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.

Related CPE's


a

apache

kafka

3

Vulnerable

a

oracle

communications_brm_-_elastic_charging_engine

2


a

oracle

financial_services_analytical_applications_infrastructure

2

a

oracle

financial_services_behavior_detection_platform

4

a

oracle

financial_services_enterprise_case_management

6

a

oracle

primavera_unifier

4

Weaknesses



CWE-203


CWE-203

CVSS impact metrics


CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.9 · Medium

  • CVSS V3.1

  • CVSS V3.0

  • CVSS V2.0

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-09-22T09:15:07.847

3 years ago

Last modified

2023-11-07T03:37:22.183

1 year ago