CVE-2024-8285 PUBLISHED CVSS 5.900000095367432 MEDIUM

A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server's hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.

EPSS 0.15% · 35.2th percentile

Risk Scores

CVSS v3.1
5.900000095367432
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
EPSS Score
0.15%
35.2th percentile

Affected Products

VendorProductVersions
Red Hatstreams for Apache Kafka
0.80.0
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Mavenio.kroxylicious:kroxylicious-runtime0
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red HatStreams for Apache Kafka 2.8.0
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
redhatkroxylicious
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka
Red Hatstreams for Apache Kafka

…and 6 more

Timeline

References

Open in Interactive Console →