Wiz Agents & Workflows are here

CVE-2024-56128
Java vulnerability analysis and mitigation

Overview

Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802. Specifically, the server failed to verify that the nonce sent by the client in the second message matches the nonce sent by the server in its first message. This vulnerability affects Apache Kafka versions 0.10.2.0 through 3.9.0, excluding versions 3.9.0, 3.8.1, and 3.7.2 (OSS Security).

Technical details

The vulnerability stems from an incorrect implementation of the SCRAM authentication algorithm where the server does not perform nonce validation in the final message of the SCRAM authentication exchange. This validation is required by RFC 5802 to ensure the integrity of the authentication process. The issue has been assigned a low severity rating as it is only exploitable when an attacker has plaintext access to the SCRAM authentication exchange (OSS Security).

Impact

The vulnerability is only exploitable when an attacker has plaintext access to the SCRAM authentication exchange. Deployments using SCRAM with TLS encryption are not affected by this issue. The impact is limited to environments where SCRAM is used over plaintext communication channels (OSS Security).

Mitigation and workarounds

Users are advised to upgrade to Apache Kafka version 3.7.2 or later. For those unable to upgrade immediately, two mitigation options are available: 1) Deploy SCRAM exclusively with TLS encryption to protect authentication exchanges from interception, or 2) Consider alternative authentication mechanisms such as PLAIN, Kerberos, or OAuth with TLS, which provide additional security layers (OSS Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34361CRITICAL9.3
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.validation
NoYesMar 30, 2026
CVE-2026-34214HIGH7.7
  • JavaJava
  • trino
NoYesMar 29, 2026
CVE-2026-34359HIGH7.4
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026
CVE-2026-34237MEDIUM6.1
  • JavaJava
  • io.modelcontextprotocol.sdk:mcp-core
NoYesMar 30, 2026
CVE-2026-34360MEDIUM5.8
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management