CVE-2025-59390: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Apache Software Foundation Apache Druid
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
AI Analysis
Technical Summary
Apache Druid, a high-performance analytics data store, includes a Kerberos authenticator component that relies on a secret to sign authentication cookies. In versions up to 34.0.0, if the configuration parameter 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is not explicitly set by the administrator, the system falls back to generating a secret using Java's ThreadLocalRandom. ThreadLocalRandom is a pseudo-random number generator designed for performance and concurrency but is not cryptographically secure, making the generated secret predictable or brute-forceable by attackers. This weakness can allow an attacker to forge authentication tokens or bypass authentication controls, compromising the confidentiality and integrity of the system. Furthermore, because each process generates its own fallback secret independently, in multi-node or distributed Apache Druid clusters, the secrets differ across nodes, causing authentication failures and effectively misconfiguring the cluster. This can lead to availability issues and operational disruptions. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG). The Apache Software Foundation addressed this issue in version 35.0.0 by requiring the explicit setting of a strong 'cookieSignatureSecret' and preventing services from starting if it is missing, thereby eliminating the fallback to a weak secret. No known exploits are reported in the wild as of now, but the risk remains significant due to the potential for token forgery and authentication bypass.
Potential Impact
For European organizations leveraging Apache Druid for analytics, especially those using Kerberos authentication, this vulnerability poses a risk of unauthorized access through forged authentication cookies. Attackers could impersonate legitimate users or services, leading to data confidentiality breaches and potential data manipulation. The inconsistent fallback secrets across nodes in distributed deployments can cause authentication failures, resulting in service outages or degraded cluster functionality, impacting availability. Organizations in sectors with strict data protection regulations (e.g., GDPR) could face compliance issues and reputational damage if exploited. The risk is heightened in environments where the default configuration is used without setting a strong secret, which may be common in less mature deployments or during rapid scaling. Given Apache Druid's adoption in finance, telecommunications, and government sectors across Europe, the impact could be widespread, affecting critical analytics infrastructure and decision-making processes.
Mitigation Recommendations
European organizations should immediately upgrade Apache Druid to version 35.0.0 or later, which enforces the mandatory configuration of a strong 'druid.auth.authenticator.kerberos.cookieSignatureSecret'. Until upgrade is possible, administrators must explicitly set a cryptographically secure secret in this configuration parameter to prevent fallback to the weak PRNG. The secret should be generated using a cryptographically secure random number generator (e.g., Java's SecureRandom) and be of sufficient length and complexity to resist brute force attacks. Additionally, organizations should audit their current Druid deployments to identify any instances running vulnerable versions with default or unset secrets. Monitoring authentication logs for suspicious token usage or repeated authentication failures can help detect exploitation attempts. For distributed clusters, ensure consistent secret configuration across all nodes to avoid authentication inconsistencies. Finally, incorporate this configuration check into deployment automation and configuration management to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Switzerland
CVE-2025-59390: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Apache Software Foundation Apache Druid
Description
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
AI-Powered Analysis
Technical Analysis
Apache Druid, a high-performance analytics data store, includes a Kerberos authenticator component that relies on a secret to sign authentication cookies. In versions up to 34.0.0, if the configuration parameter 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is not explicitly set by the administrator, the system falls back to generating a secret using Java's ThreadLocalRandom. ThreadLocalRandom is a pseudo-random number generator designed for performance and concurrency but is not cryptographically secure, making the generated secret predictable or brute-forceable by attackers. This weakness can allow an attacker to forge authentication tokens or bypass authentication controls, compromising the confidentiality and integrity of the system. Furthermore, because each process generates its own fallback secret independently, in multi-node or distributed Apache Druid clusters, the secrets differ across nodes, causing authentication failures and effectively misconfiguring the cluster. This can lead to availability issues and operational disruptions. The vulnerability is classified under CWE-338 (Use of Cryptographically Weak PRNG). The Apache Software Foundation addressed this issue in version 35.0.0 by requiring the explicit setting of a strong 'cookieSignatureSecret' and preventing services from starting if it is missing, thereby eliminating the fallback to a weak secret. No known exploits are reported in the wild as of now, but the risk remains significant due to the potential for token forgery and authentication bypass.
Potential Impact
For European organizations leveraging Apache Druid for analytics, especially those using Kerberos authentication, this vulnerability poses a risk of unauthorized access through forged authentication cookies. Attackers could impersonate legitimate users or services, leading to data confidentiality breaches and potential data manipulation. The inconsistent fallback secrets across nodes in distributed deployments can cause authentication failures, resulting in service outages or degraded cluster functionality, impacting availability. Organizations in sectors with strict data protection regulations (e.g., GDPR) could face compliance issues and reputational damage if exploited. The risk is heightened in environments where the default configuration is used without setting a strong secret, which may be common in less mature deployments or during rapid scaling. Given Apache Druid's adoption in finance, telecommunications, and government sectors across Europe, the impact could be widespread, affecting critical analytics infrastructure and decision-making processes.
Mitigation Recommendations
European organizations should immediately upgrade Apache Druid to version 35.0.0 or later, which enforces the mandatory configuration of a strong 'druid.auth.authenticator.kerberos.cookieSignatureSecret'. Until upgrade is possible, administrators must explicitly set a cryptographically secure secret in this configuration parameter to prevent fallback to the weak PRNG. The secret should be generated using a cryptographically secure random number generator (e.g., Java's SecureRandom) and be of sufficient length and complexity to resist brute force attacks. Additionally, organizations should audit their current Druid deployments to identify any instances running vulnerable versions with default or unset secrets. Monitoring authentication logs for suspicious token usage or repeated authentication failures can help detect exploitation attempts. For distributed clusters, ensure consistent secret configuration across all nodes to avoid authentication inconsistencies. Finally, incorporate this configuration check into deployment automation and configuration management to prevent recurrence.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-09-15T10:03:37.911Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6926c34b1118926627ff927f
Added to database: 11/26/2025, 9:07:23 AM
Last enriched: 11/26/2025, 9:12:45 AM
Last updated: 11/26/2025, 8:29:34 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.