CVE-2025-58457
BaseFortify
Publication date: 2025-09-24
Last updated on: 2025-11-04
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | zookeeper | From 3.9.0 (inc) to 3.9.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-280 | The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper permission check in the ZooKeeper AdminServer that allows authorized clients to run snapshot and restore commands without having sufficient permissions. It affects Apache ZooKeeper versions from 3.9.0 up to but not including 3.9.4.
How can this vulnerability impact me? :
The vulnerability can allow authorized clients to execute snapshot and restore commands without proper permissions, potentially leading to unauthorized data access or modification within the ZooKeeper service. This could compromise the integrity and availability of the data managed by ZooKeeper.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading Apache ZooKeeper to version 3.9.4 or later. Alternatively, you can disable the snapshot and restore commands by setting admin.snapshot.enabled and admin.restore.enabled to false, disable the entire AdminServer interface by setting admin.enableServer to false, or ensure that the root ACL does not provide open permissions to restrict unauthorized access.