Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2018-17196

In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses transaction/idempotent ACL validation. Only authenticated clients with Write permission on the respective topics are able to exploit this vulnerability. Users should upgrade to 2.1.1 or later where this vulnerability has been fixed.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 45.0%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
References
Products affected by CVE-2018-17196
  • Apache » Kafka » Version: 0.11.0.0
    cpe:2.3:a:apache:kafka:0.11.0.0
  • Apache » Kafka » Version: 0.11.0.1
    cpe:2.3:a:apache:kafka:0.11.0.1
  • Apache » Kafka » Version: 0.11.0.2
    cpe:2.3:a:apache:kafka:0.11.0.2
  • Apache » Kafka » Version: 0.11.0.3
    cpe:2.3:a:apache:kafka:0.11.0.3
  • Apache » Kafka » Version: 1.0.0
    cpe:2.3:a:apache:kafka:1.0.0
  • Apache » Kafka » Version: 1.0.1
    cpe:2.3:a:apache:kafka:1.0.1
  • Apache » Kafka » Version: 1.0.2
    cpe:2.3:a:apache:kafka:1.0.2
  • Apache » Kafka » Version: 1.1.0
    cpe:2.3:a:apache:kafka:1.1.0
  • Apache » Kafka » Version: 1.1.1
    cpe:2.3:a:apache:kafka:1.1.1
  • Apache » Kafka » Version: 2.0.0
    cpe:2.3:a:apache:kafka:2.0.0
  • Apache » Kafka » Version: 2.0.1
    cpe:2.3:a:apache:kafka:2.0.1
  • Apache » Kafka » Version: 2.0.2
    cpe:2.3:a:apache:kafka:2.0.2
  • Apache » Kafka » Version: 2.1.0
    cpe:2.3:a:apache:kafka:2.1.0


Contact Us

Shodan ® - All rights reserved