Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59390: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Apache Software Foundation Apache Druid

0
Critical
VulnerabilityCVE-2025-59390cvecve-2025-59390cwe-338
Published: Wed Nov 26 2025 (11/26/2025, 08:50:07 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Druid

Description

Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.

AI-Powered Analysis

AILast updated: 11/26/2025, 09:12:45 UTC

Technical Analysis

Apache Druid, a high-performance analytics data store, includes a Kerberos authenticator component that relies on a secret to sign authentication cookies. In versions up to 34.0.0, if the configuration parameter 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is not explicitly set by the administrator, the system falls back to generating a secret using Java's ThreadLocalRandom. ThreadLocalRandom is a pseudo-random number generator designed for performance and concurrency but is not cryptographically secure, making the generated secret predictable or brute-forceable by attackers. This weakness can allow an attacker to forge authentication tokens or bypass authentication controls, compromising the confidentiality and integrity of the system. Furthermore, because each process generates its own fallback secret independently, in multi-node or distributed Apache Druid clusters, the secrets differ across nodes, causing authentication failures and effectively misconfiguring the cluster. This can lead to availability issues and operational disruptions. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG). The Apache Software Foundation addressed this issue in version 35.0.0 by requiring the explicit setting of a strong 'cookieSignatureSecret' and preventing services from starting if it is missing, thereby eliminating the fallback to a weak secret. No known exploits are reported in the wild as of now, but the risk remains significant due to the potential for token forgery and authentication bypass.

Potential Impact

For European organizations leveraging Apache Druid for analytics, especially those using Kerberos authentication, this vulnerability poses a risk of unauthorized access through forged authentication cookies. Attackers could impersonate legitimate users or services, leading to data confidentiality breaches and potential data manipulation. The inconsistent fallback secrets across nodes in distributed deployments can cause authentication failures, resulting in service outages or degraded cluster functionality, impacting availability. Organizations in sectors with strict data protection regulations (e.g., GDPR) could face compliance issues and reputational damage if exploited. The risk is heightened in environments where the default configuration is used without setting a strong secret, which may be common in less mature deployments or during rapid scaling. Given Apache Druid's adoption in finance, telecommunications, and government sectors across Europe, the impact could be widespread, affecting critical analytics infrastructure and decision-making processes.

Mitigation Recommendations

European organizations should immediately upgrade Apache Druid to version 35.0.0 or later, which enforces the mandatory configuration of a strong 'druid.auth.authenticator.kerberos.cookieSignatureSecret'. Until upgrade is possible, administrators must explicitly set a cryptographically secure secret in this configuration parameter to prevent fallback to the weak PRNG. The secret should be generated using a cryptographically secure random number generator (e.g., Java's SecureRandom) and be of sufficient length and complexity to resist brute force attacks. Additionally, organizations should audit their current Druid deployments to identify any instances running vulnerable versions with default or unset secrets. Monitoring authentication logs for suspicious token usage or repeated authentication failures can help detect exploitation attempts. For distributed clusters, ensure consistent secret configuration across all nodes to avoid authentication inconsistencies. Finally, incorporate this configuration check into deployment automation and configuration management to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-09-15T10:03:37.911Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6926c34b1118926627ff927f

Added to database: 11/26/2025, 9:07:23 AM

Last enriched: 11/26/2025, 9:12:45 AM

Last updated: 11/26/2025, 8:29:34 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats