A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions.
History

Thu, 29 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2022-09-20T08:35:07.000Z

Updated: 2025-05-29T13:39:10.405Z

Reserved: 2022-07-04T00:00:00.000Z

Link: CVE-2022-34917

cve-icon Vulnrichment

Updated: 2024-08-03T09:22:10.826Z

cve-icon NVD

Status : Modified

Published: 2022-09-20T09:15:09.437

Modified: 2025-05-29T14:15:28.543

Link: CVE-2022-34917

cve-icon Redhat

Severity : Important

Publid Date: 2022-09-19T00:00:00Z

Links: CVE-2022-34917 - Bugzilla