icon

We found results for “

CVE-2024-8285

Good to know:

icon
icon

Date: August 30, 2024

A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server's hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Improper Certificate Validation

CWE-295

Improper Validation of Certificate with Host Mismatch

CWE-297

Top Fix

icon

Upgrade Version

Upgrade to version io.kroxylicious:kroxylicious-runtime:0.8.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us