CVE-2025-59390: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Apache Software Foundation Apache Druid
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
AI Analysis
Technical Summary
Apache Druid, a high-performance real-time analytics database, includes a Kerberos authenticator component that relies on a secret to sign authentication cookies. In versions through 34.0.0, if the configuration parameter 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is not set, the system falls back to generating a secret using Java's ThreadLocalRandom. ThreadLocalRandom is not a cryptographically secure pseudo-random number generator (PRNG), making the fallback secret predictable or brute-forceable by attackers. This vulnerability (CWE-338) enables attackers to forge authentication tokens, bypass authentication controls, and potentially gain unauthorized access. Furthermore, because each process generates its own fallback secret independently, multi-node or distributed Apache Druid clusters experience inconsistent secrets across nodes, leading to authentication failures and misconfigured clusters. The vulnerability is addressed in Apache Druid 35.0.0, which mandates explicit configuration of a strong 'cookieSignatureSecret' and prevents the service from starting without it, thereby eliminating the fallback to a weak PRNG. The CVSS 3.1 score of 9.8 indicates a critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Apache Druid versions up to 34.0.0, this vulnerability poses a severe risk. Attackers can exploit the weak fallback secret to forge authentication cookies, bypassing Kerberos authentication and gaining unauthorized access to sensitive analytics data. This compromises confidentiality and integrity of data, and may allow attackers to manipulate or disrupt analytics operations, impacting availability. Distributed deployments common in large enterprises and service providers will face authentication failures due to inconsistent secrets, causing operational disruptions and potential downtime. Given Apache Druid's use in sectors like finance, telecommunications, and government analytics across Europe, exploitation could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The ease of exploitation without authentication or user interaction increases the urgency for mitigation.
Mitigation Recommendations
European organizations should immediately audit their Apache Druid deployments to identify versions prior to 35.0.0 and verify if 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is configured. The primary mitigation is to upgrade to Apache Druid 35.0.0 or later, which enforces mandatory strong secret configuration and disables fallback to weak PRNG. If immediate upgrade is not feasible, administrators must explicitly set a strong, cryptographically secure secret for 'druid.auth.authenticator.kerberos.cookieSignatureSecret' using a high-entropy random value generated by a secure PRNG (e.g., SecureRandom). Additionally, organizations should monitor authentication logs for anomalies indicative of token forgery or authentication bypass attempts. Network segmentation and strict access controls around Apache Druid nodes can reduce exposure. Finally, integrating multi-factor authentication and continuous security monitoring can help detect and prevent exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Switzerland
CVE-2025-59390: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Apache Software Foundation Apache Druid
Description
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
AI-Powered Analysis
Technical Analysis
Apache Druid, a high-performance real-time analytics database, includes a Kerberos authenticator component that relies on a secret to sign authentication cookies. In versions through 34.0.0, if the configuration parameter 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is not set, the system falls back to generating a secret using Java's ThreadLocalRandom. ThreadLocalRandom is not a cryptographically secure pseudo-random number generator (PRNG), making the fallback secret predictable or brute-forceable by attackers. This vulnerability (CWE-338) enables attackers to forge authentication tokens, bypass authentication controls, and potentially gain unauthorized access. Furthermore, because each process generates its own fallback secret independently, multi-node or distributed Apache Druid clusters experience inconsistent secrets across nodes, leading to authentication failures and misconfigured clusters. The vulnerability is addressed in Apache Druid 35.0.0, which mandates explicit configuration of a strong 'cookieSignatureSecret' and prevents the service from starting without it, thereby eliminating the fallback to a weak PRNG. The CVSS 3.1 score of 9.8 indicates a critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Apache Druid versions up to 34.0.0, this vulnerability poses a severe risk. Attackers can exploit the weak fallback secret to forge authentication cookies, bypassing Kerberos authentication and gaining unauthorized access to sensitive analytics data. This compromises confidentiality and integrity of data, and may allow attackers to manipulate or disrupt analytics operations, impacting availability. Distributed deployments common in large enterprises and service providers will face authentication failures due to inconsistent secrets, causing operational disruptions and potential downtime. Given Apache Druid's use in sectors like finance, telecommunications, and government analytics across Europe, exploitation could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The ease of exploitation without authentication or user interaction increases the urgency for mitigation.
Mitigation Recommendations
European organizations should immediately audit their Apache Druid deployments to identify versions prior to 35.0.0 and verify if 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is configured. The primary mitigation is to upgrade to Apache Druid 35.0.0 or later, which enforces mandatory strong secret configuration and disables fallback to weak PRNG. If immediate upgrade is not feasible, administrators must explicitly set a strong, cryptographically secure secret for 'druid.auth.authenticator.kerberos.cookieSignatureSecret' using a high-entropy random value generated by a secure PRNG (e.g., SecureRandom). Additionally, organizations should monitor authentication logs for anomalies indicative of token forgery or authentication bypass attempts. Network segmentation and strict access controls around Apache Druid nodes can reduce exposure. Finally, integrating multi-factor authentication and continuous security monitoring can help detect and prevent exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-09-15T10:03:37.911Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6926c34b1118926627ff927f
Added to database: 11/26/2025, 9:07:23 AM
Last enriched: 12/11/2025, 9:28:42 PM
Last updated: 1/10/2026, 10:15:08 PM
Views: 193
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.