CVE-2026-27134

8.1 HIGH

📋 TL;DR

This vulnerability allows unauthorized authentication in Strimzi Kafka clusters when using custom CA certificates with multi-stage chains. Attackers with certificates signed by any CA in the chain can authenticate to internal and user-configured listeners. Only affects users with custom Cluster or Clients CA using multi-stage CA chains.

💻 Affected Systems

Products:
  • Strimzi Kafka Operator
Versions: 0.49.0 through 0.50.0
Operating Systems: Any running Kubernetes/OpenShift
Default Config Vulnerable: ✅ No
Notes: Only affects users with custom Cluster or Clients CA using multi-stage CA chains. Does not affect default Strimzi-managed CAs or single CA configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users gain full access to Kafka cluster, potentially reading sensitive data, injecting malicious messages, or disrupting operations.

🟠

Likely Case

Privilege escalation where users with certificates from unintended CAs gain access to Kafka resources they shouldn't have.

🟢

If Mitigated

Limited impact if proper network segmentation and additional authentication layers are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid certificate from any CA in the chain, making it straightforward for attackers who obtain such certificates.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.50.1

Vendor Advisory: https://github.com/strimzi/strimzi-kafka-operator/security/advisories/GHSA-2qwx-rq6j-8r6j

Restart Required: Yes

Instructions:

1. Upgrade Strimzi operator to version 0.50.1 or later. 2. Update all Kafka custom resources to use the new operator version. 3. Restart affected Kafka pods to apply the fix.

🔧 Temporary Workarounds

Use Single CA Instead of Full Chain

all

Instead of providing the full CA chain as the custom CA, provide only the single CA that should be used for authentication.

# Update your custom CA configuration to include only the intended root CA certificate
# Remove intermediate CAs from your CA chain configuration

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to Kafka listeners
  • Add additional authentication layers (e.g., application-level auth) for Kafka access

🔍 How to Verify

Check if Vulnerable:

Check if using Strimzi versions 0.49.0-0.50.0 with custom CA certificates containing multiple CAs in the chain.

Check Version:

kubectl get deployment strimzi-cluster-operator -o jsonpath='{.spec.template.spec.containers[0].image}'

Verify Fix Applied:

Verify Strimzi operator version is 0.50.1 or later and custom CA configurations use only intended root CA.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected authentication successes from unknown certificate issuers
  • Authentication attempts using certificates from unintended CAs

Network Indicators:

  • mTLS connections from unexpected sources or using unexpected certificate chains

SIEM Query:

source="kafka" AND (event="authentication_success" AND NOT cert_issuer="expected_issuer")

🔗 References

📤 Share & Export