CVE-2026-32588
Received Received - Intake
Authenticated DoS via CQL in Apache Cassandra 4.x Causes Latency

Publication date: 2026-04-07

Last updated on: 2026-04-15

Assigner: Apache Software Foundation

Description
Authenticated DoS over CQL in Apache Cassandra 4.0, 4.1, 5.0 allows authenticated user to raise query latencies via repeated password changes. Users are recommended to upgrade to version 4.0.20, 4.1.11, 5.0.7, which fixes this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-15
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
apache cassandra From 4.0.0 (inc) to 4.0.20 (exc)
apache cassandra From 4.1.0 (inc) to 4.1.11 (exc)
apache cassandra From 5.0.0 (inc) to 5.0.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an authenticated denial-of-service condition caused by repeated password changes via ALTER ROLE commands over CQL in Apache Cassandra.

To detect exploitation attempts on your system, monitor for unusually high latencies or performance degradation related to CQL queries, especially those involving ALTER ROLE commands.

You can use Cassandra's query logs or audit logs to identify frequent ALTER ROLE commands executed by authenticated users.

While no specific commands are provided in the resources, a general approach could include:

  • Checking Cassandra logs for repeated ALTER ROLE commands: grep or search for 'ALTER ROLE' in system logs.
  • Monitoring query latencies using Cassandra's nodetool or metrics tools to detect spikes in query execution times.
  • Using CQLSH or other CQL clients to review user role changes or audit trails if enabled.

Upgrading to fixed versions (4.0.20, 4.1.11, 5.0.7) is recommended to mitigate this issue.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

This vulnerability is an authenticated Denial of Service (DoS) issue in Apache Cassandra versions 4.0, 4.1, and 5.0. It allows an authenticated user to increase query latencies by repeatedly changing their password via the Cassandra Query Language (CQL).


How can this vulnerability impact me? :

The impact of this vulnerability is that an authenticated user can degrade the performance of the Cassandra database by causing increased query latencies. This can lead to slower response times and potentially disrupt normal database operations, effectively causing a Denial of Service condition.


What immediate steps should I take to mitigate this vulnerability?

Users are recommended to upgrade Apache Cassandra to versions 4.0.20, 4.1.11, or 5.0.7, which fix this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart