Skip to main content

CVE-2022-34917: CWE-789: Memory Allocation with Excessive Size Value in Apache Software Foundation Apache Kafka

High
VulnerabilityCVE-2022-34917cvecve-2022-34917cwe-789
Published: Tue Sep 20 2022 (09/20/2022, 08:35:07 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Kafka

Description

A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:09:56 UTC

Technical Analysis

CVE-2022-34917 is a high-severity vulnerability affecting Apache Kafka versions 2.8.0 through 3.2.1. The issue is classified under CWE-789, which pertains to memory allocation with excessive size values. Specifically, this vulnerability allows unauthenticated or insufficiently authenticated clients to request the allocation of large amounts of memory on Kafka brokers. This can cause the brokers to exhaust available memory resources, leading to OutOfMemoryException errors and resulting in denial of service (DoS) conditions. The impact varies depending on the authentication configuration of the Kafka cluster: in clusters without authentication, any client able to connect to a broker can exploit the vulnerability; in clusters using SASL authentication, clients without valid SASL credentials but able to connect can still trigger the issue; in clusters using TLS authentication, only clients that successfully authenticate via TLS can exploit the vulnerability. The root cause lies in insufficient validation of memory allocation requests, allowing attackers to specify excessive sizes. The vulnerability does not affect confidentiality or integrity directly but severely impacts availability by causing service outages. The Apache Software Foundation has addressed this issue in Kafka versions 2.8.2, 3.0.2, 3.1.2, and 3.2.3, and users are strongly advised to upgrade to these or later versions to mitigate the risk. No known exploits are currently reported in the wild, but the ease of exploitation and potential impact warrant prompt remediation.

Potential Impact

For European organizations, the impact of CVE-2022-34917 can be significant, especially for enterprises relying on Apache Kafka for critical data streaming, event processing, and real-time analytics. Kafka is widely used in sectors such as finance, telecommunications, manufacturing, and public services across Europe. A successful exploitation could lead to broker outages, disrupting data pipelines and causing downtime in dependent applications and services. This can result in operational delays, financial losses, and reputational damage. Organizations with Kafka clusters lacking strong authentication mechanisms are particularly vulnerable, as attackers can exploit the vulnerability without credentials. Even in environments with SASL or TLS authentication, the risk remains if network access controls are insufficient. The denial of service could also be leveraged as part of a larger attack campaign to degrade service availability or distract security teams. Given the critical role Kafka plays in modern IT infrastructures, the availability impact can cascade to multiple business units and external customers.

Mitigation Recommendations

Beyond upgrading to the fixed Kafka versions (2.8.2, 3.0.2, 3.1.2, or 3.2.3), European organizations should implement several targeted mitigations: 1) Enforce strict network segmentation and firewall rules to limit broker access only to trusted clients and internal systems, reducing exposure to unauthenticated attackers. 2) Enable and enforce strong authentication mechanisms such as TLS mutual authentication or SASL with robust credential management to prevent unauthorized connections. 3) Monitor broker logs and metrics for unusual memory allocation patterns or spikes in resource usage that could indicate exploitation attempts. 4) Implement rate limiting or connection throttling at the network or Kafka broker level to mitigate rapid or excessive memory allocation requests. 5) Conduct regular security audits and penetration testing focused on Kafka deployments to identify and remediate configuration weaknesses. 6) Maintain an up-to-date inventory of Kafka versions in use and automate patch management processes to ensure timely application of security updates. 7) Consider deploying Kafka in high-availability configurations with failover capabilities to minimize service disruption in case of an attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2022-07-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386826182aa0cae2801b5d

Added to database: 5/29/2025, 1:59:02 PM

Last enriched: 7/8/2025, 3:09:56 AM

Last updated: 8/16/2025, 12:15:10 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats