CVE-2026-27133
Certificate Validation Bypass in Strimzi Kafka Connect and MirrorMaker
Publication date: 2026-02-20
Last updated on: 2026-02-27
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linuxfoundation | strimzi | From 0.47.0 (inc) to 0.50.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-296 | The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate. |
| CWE-295 | The product does not validate, or incorrectly validates, a certificate. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Strimzi versions from 0.47.0 to before 0.50.1, affecting Kafka Connect and Kafka MirrorMaker 2 components. When a chain of multiple Certificate Authority (CA) certificates is configured as trusted, the system incorrectly trusts each CA certificate in the chain individually rather than only the final CA in the chain. This means that connections to the Apache Kafka cluster might be accepted if the server certificate is signed by any CA in the chain, not just the intended one.
How can this vulnerability impact me? :
The vulnerability can lead to improper trust validation when connecting to Kafka brokers. An attacker with a certificate signed by any CA in the trusted chain (not necessarily the final CA) could potentially establish a connection to the Kafka cluster. This could allow unauthorized access or man-in-the-middle attacks, compromising confidentiality and integrity of the data transmitted.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade Strimzi to version 0.50.1 or later, where the issue has been fixed.