
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-38153 is a timing attack vulnerability affecting Apache Kafka components that use Arrays.equals to validate passwords or keys. The vulnerability was disclosed on September 21, 2021, and affects Apache Kafka versions 2.0.0 through 2.8.0. This vulnerability impacts the security of credential validation in Apache Kafka Connect and Clients (Kafka CVE List).
The vulnerability stems from the usage of Arrays.equals method for password and key validation, which is susceptible to timing attacks. This implementation can make brute force attacks more likely to succeed by allowing attackers to measure the time taken for comparison operations. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD).
This vulnerability could result in privilege escalation by making brute force attacks against passwords or keys more effective through timing analysis. The successful exploitation could lead to unauthorized access to sensitive information (Kafka CVE List).
Users should upgrade to Apache Kafka versions 2.6.3, 2.7.2, 2.8.1, 3.0.0 or later where this vulnerability has been fixed. These versions implement secure comparison methods that are not vulnerable to timing attacks (Kafka CVE List).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."