CVE-2020-26168
📋 TL;DR
This vulnerability allows authentication bypass in Hazelcast IMDG Enterprise and Jet Enterprise when using LDAP authentication with system-user-dn configurations. Attackers can authenticate with invalid passwords, potentially gaining unauthorized access to cluster resources. Affects organizations using Hazelcast Enterprise 4.x with LDAP authentication enabled.
💻 Affected Systems
- Hazelcast IMDG Enterprise
- Hazelcast Jet Enterprise
📦 What is this software?
Hazelcast by Hazelcast
Jet by Hazelcast
⚠️ Risk & Real-World Impact
Worst Case
Complete cluster compromise allowing unauthorized users to access sensitive data, modify configurations, or disrupt operations across the entire Hazelcast cluster.
Likely Case
Unauthorized access to cluster data and operations by internal or external attackers who discover the vulnerability, potentially leading to data theft or service disruption.
If Mitigated
Limited impact if network segmentation, additional authentication layers, or monitoring detects unusual authentication attempts before exploitation.
🎯 Exploit Status
Exploitation requires network access to Hazelcast cluster and knowledge that LDAP authentication is enabled. No special tools or complex techniques needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Hazelcast IMDG Enterprise 4.0.3 or later; Hazelcast Jet Enterprise 4.3 or later
Vendor Advisory: https://hazelcast.zendesk.com/hc/en-us/articles/360050161951--IMDG-Enterprise-4-0-4-0-1-4-0-2-LDAP-Authentication-Bypass
Restart Required: Yes
Instructions:
1. Download patched version from Hazelcast portal. 2. Stop all Hazelcast nodes. 3. Replace JAR files with patched versions. 4. Restart nodes. 5. Verify authentication works correctly.
🔧 Temporary Workarounds
Disable LDAP Authentication
allTemporarily disable LDAP authentication until patching can be completed
Modify hazelcast.xml to remove or comment out <ldap> authentication configuration
Use Alternative Authentication
allSwitch to username/password or other authentication methods temporarily
Update hazelcast.xml to use <username-password> or other non-LDAP authentication
🧯 If You Can't Patch
- Implement network segmentation to restrict access to Hazelcast clusters only to trusted systems
- Enable additional authentication layers (VPN, firewall rules, IP whitelisting) and monitor authentication logs for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check hazelcast.xml configuration for LDAP authentication and verify version is in affected range. Test authentication with invalid credentials.
Check Version:
java -jar hazelcast-enterprise-*.jar --version
Verify Fix Applied:
After patching, attempt authentication with invalid LDAP credentials to confirm it's rejected. Verify version shows 4.0.3+ for IMDG or 4.3+ for Jet.
📡 Detection & Monitoring
Log Indicators:
- Successful LDAP authentication with unusual timing or from unexpected IPs
- Multiple failed authentication attempts followed by success from same source
Network Indicators:
- LDAP authentication requests to Hazelcast clusters from unauthorized sources
- Unusual data access patterns following authentication
SIEM Query:
source="hazelcast" AND (event="authentication_success" OR event="ldap_auth") AND NOT user IN allowed_users
🔗 References
- https://docs.hazelcast.org/docs/ern/index.html#4-0-3
- https://hazelcast.zendesk.com/hc/en-us/articles/360050161951--IMDG-Enterprise-4-0-4-0-1-4-0-2-LDAP-Authentication-Bypass
- https://hazelcast.zendesk.com/hc/en-us/articles/360051384932--JET-Enterprise-4-0-4-1-4-1-1-4-2-LDAP-Authentication-Bypass
- https://jet-start.sh/blog/2020/10/23/jet-43-is-released
- https://docs.hazelcast.org/docs/ern/index.html#4-0-3
- https://hazelcast.zendesk.com/hc/en-us/articles/360050161951--IMDG-Enterprise-4-0-4-0-1-4-0-2-LDAP-Authentication-Bypass
- https://hazelcast.zendesk.com/hc/en-us/articles/360051384932--JET-Enterprise-4-0-4-1-4-1-1-4-2-LDAP-Authentication-Bypass
- https://jet-start.sh/blog/2020/10/23/jet-43-is-released