CVE-2024-56128

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Dec 18, 2024
CWE ID 303

Summary

CVE-2024-56128 is a vulnerability affecting Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM). The issue arises from Kafka's failure to perform required nonce validation in the SCRAM authentication exchange, as specified in RFC 5802. This vulnerability is significant as it can only be exploited when an attacker gains access to plaintext SCRAM authentication exchanges, which is discouraged due to security concerns. To mitigate this issue, Apache Kafka recommends deploying SCRAM exclusively with TLS encryption, or considering alternative authentication mechanisms. Affected versions include 0.10.2.0 through 3.9.0, with fixed versions being 3.9.0, 3.8.1, and 3.7.2. Users should upgrade to 3.7.2 or later to address the vulnerability. For those unable to upgrade, using TLS with SCRAM authentication or evaluating alternative authentication mechanisms are recommended to enhance security.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • Apache Kafka

Affected Vendors

  • Apache Corporation