CVE-2025-59390
November 26, 2025
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the "druid.auth.authenticator.kerberos.cookieSignatureSecret" configuration is not explicitly set. In this case, the secret is generated using "ThreadLocalRandom",
which is not a crypto-graphically secure random number generator. This
may allow an attacker to predict or brute force the secret used to sign
authentication cookies, potentially enabling token forgery or
authentication bypass. Additionally, each process generates its own
fallback secret, resulting in inconsistent secrets across nodes. This
causes authentication failures in distributed or multi-broker
deployments, effectively leading to a incorrectly configured clusters. Users are
advised to configure a strong "druid.auth.authenticator.kerberos.cookieSignatureSecret"
This issue affects Apache Druid: through 34.0.0.
Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set "druid.auth.authenticator.kerberos.cookieSignatureSecret" when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
Affected Packages
https://github.com/apache/druid.git (GITHUB):
Affected version(s) >=druid-0.1.0 <druid-35.0.0Fix Suggestion:
Update to version druid-35.0.0org.apache.druid.extensions:druid-kerberos (JAVA):
Affected version(s) >=0.13.0-incubating <35.0.0Fix Suggestion:
Update to version 35.0.0Related Resources (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
EPSS
Base Score:
0.07