CVE-2026-27133

5.9 MEDIUM

📋 TL;DR

This vulnerability in Strimzi allows Kafka Connect or Kafka MirrorMaker 2 operands to incorrectly trust all certificates in a CA chain when connecting to Kafka brokers, rather than only trusting the final CA. This could enable unauthorized connections using certificates signed by intermediate CAs. Organizations using Strimzi versions 0.47.0 through 0.50.0 with multi-CA certificate chains are affected.

💻 Affected Systems

Products:
  • Strimzi Kafka Operator
Versions: 0.47.0 to 0.50.0 (inclusive)
Operating Systems: Any OS running Kubernetes or OpenShift
Default Config Vulnerable: ✅ No
Notes: Only affects configurations using multiple CA certificates in trusted certificate chains for Kafka Connect or Kafka MirrorMaker 2 operands.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could impersonate legitimate Kafka brokers using certificates signed by intermediate CAs in the trusted chain, potentially intercepting or manipulating data streams between Kafka components.

🟠

Likely Case

Accidental misconfiguration could allow connections from unintended brokers, leading to data integrity issues or unauthorized data access within the Kafka ecosystem.

🟢

If Mitigated

With proper network segmentation and certificate management, the impact is limited to potential configuration errors rather than active exploitation.

🌐 Internet-Facing: LOW - Strimzi deployments are typically internal to Kubernetes/OpenShift clusters and not directly internet-facing.
🏢 Internal Only: MEDIUM - The vulnerability affects internal certificate validation within Kubernetes environments, potentially allowing lateral movement or data access between internal services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to create or modify certificates within the trusted CA chain and knowledge of the specific Strimzi configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.50.1

Vendor Advisory: https://github.com/strimzi/strimzi-kafka-operator/security/advisories/GHSA-6x85-j2f7-4xc5

Restart Required: Yes

Instructions:

1. Update Strimzi operator to version 0.50.1 or later using your preferred deployment method (Helm, OperatorHub, YAML manifests). 2. Restart all Kafka Connect and Kafka MirrorMaker 2 pods to apply the fix. 3. Verify certificate validation is working correctly.

🔧 Temporary Workarounds

Simplify CA Certificate Chains

all

Use single CA certificates instead of multi-CA chains in Kafka Connect and Kafka MirrorMaker 2 configurations

# Edit KafkaConnect or KafkaMirrorMaker2 CR to use single CA certificate
kubectl edit kafkaconnect <name> -n <namespace>
# Or for MirrorMaker2
kubectl edit kafkamirrormaker2 <name> -n <namespace>

🧯 If You Can't Patch

  • Implement network policies to restrict Kafka Connect and MirrorMaker 2 pods to only communicate with authorized Kafka brokers
  • Monitor and audit all certificate changes in your CA chains and alert on unexpected intermediate CA usage

🔍 How to Verify

Check if Vulnerable:

Check Strimzi operator version and verify if any KafkaConnect or KafkaMirrorMaker2 resources use multi-CA certificate chains in their trusted certificates configuration.

Check Version:

kubectl get deployment strimzi-cluster-operator -o jsonpath='{.spec.template.spec.containers[0].image}' | grep -o ':[0-9.]*' | cut -d: -f2

Verify Fix Applied:

After upgrading to 0.50.1+, test certificate validation by attempting to connect with certificates signed by intermediate CAs (should be rejected).

📡 Detection & Monitoring

Log Indicators:

  • Unexpected certificate validation successes in Kafka Connect or MirrorMaker 2 logs
  • Connections from brokers with certificates signed by intermediate CAs

Network Indicators:

  • Unusual network connections between Kafka components
  • Traffic patterns suggesting broker impersonation

SIEM Query:

source="kafka-connect-logs" AND ("certificate validation" OR "CA chain") AND (success OR accepted)

🔗 References

📤 Share & Export