CVE-2024-56128
CVSS 3.1 Score 5.3 of 10 (medium)
Details
Summary
CVE-2024-56128 is a vulnerability affecting Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM). The issue arises from Kafka's failure to perform required nonce validation in the SCRAM authentication exchange, as specified in RFC 5802. This vulnerability is significant as it can only be exploited when an attacker gains access to plaintext SCRAM authentication exchanges, which is discouraged due to security concerns. To mitigate this issue, Apache Kafka recommends deploying SCRAM exclusively with TLS encryption, or considering alternative authentication mechanisms. Affected versions include 0.10.2.0 through 3.9.0, with fixed versions being 3.9.0, 3.8.1, and 3.7.2. Users should upgrade to 3.7.2 or later to address the vulnerability. For those unable to upgrade, using TLS with SCRAM authentication or evaluating alternative authentication mechanisms are recommended to enhance security.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- Apache Kafka
Affected Vendors
- Apache Corporation