Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59390: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Apache Software Foundation Apache Druid

0
Critical
VulnerabilityCVE-2025-59390cvecve-2025-59390cwe-338
Published: Wed Nov 26 2025 (11/26/2025, 08:50:07 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Druid

Description

Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret` This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:28:42 UTC

Technical Analysis

Apache Druid, a high-performance real-time analytics database, includes a Kerberos authenticator component that relies on a secret to sign authentication cookies. In versions through 34.0.0, if the configuration parameter 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is not set, the system falls back to generating a secret using Java's ThreadLocalRandom. ThreadLocalRandom is not a cryptographically secure pseudo-random number generator (PRNG), making the fallback secret predictable or brute-forceable by attackers. This vulnerability (CWE-338) enables attackers to forge authentication tokens, bypass authentication controls, and potentially gain unauthorized access. Furthermore, because each process generates its own fallback secret independently, multi-node or distributed Apache Druid clusters experience inconsistent secrets across nodes, leading to authentication failures and misconfigured clusters. The vulnerability is addressed in Apache Druid 35.0.0, which mandates explicit configuration of a strong 'cookieSignatureSecret' and prevents the service from starting without it, thereby eliminating the fallback to a weak PRNG. The CVSS 3.1 score of 9.8 indicates a critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability.

Potential Impact

For European organizations using Apache Druid versions up to 34.0.0, this vulnerability poses a severe risk. Attackers can exploit the weak fallback secret to forge authentication cookies, bypassing Kerberos authentication and gaining unauthorized access to sensitive analytics data. This compromises confidentiality and integrity of data, and may allow attackers to manipulate or disrupt analytics operations, impacting availability. Distributed deployments common in large enterprises and service providers will face authentication failures due to inconsistent secrets, causing operational disruptions and potential downtime. Given Apache Druid's use in sectors like finance, telecommunications, and government analytics across Europe, exploitation could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The ease of exploitation without authentication or user interaction increases the urgency for mitigation.

Mitigation Recommendations

European organizations should immediately audit their Apache Druid deployments to identify versions prior to 35.0.0 and verify if 'druid.auth.authenticator.kerberos.cookieSignatureSecret' is configured. The primary mitigation is to upgrade to Apache Druid 35.0.0 or later, which enforces mandatory strong secret configuration and disables fallback to weak PRNG. If immediate upgrade is not feasible, administrators must explicitly set a strong, cryptographically secure secret for 'druid.auth.authenticator.kerberos.cookieSignatureSecret' using a high-entropy random value generated by a secure PRNG (e.g., SecureRandom). Additionally, organizations should monitor authentication logs for anomalies indicative of token forgery or authentication bypass attempts. Network segmentation and strict access controls around Apache Druid nodes can reduce exposure. Finally, integrating multi-factor authentication and continuous security monitoring can help detect and prevent exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-09-15T10:03:37.911Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6926c34b1118926627ff927f

Added to database: 11/26/2025, 9:07:23 AM

Last enriched: 12/11/2025, 9:28:42 PM

Last updated: 1/10/2026, 10:15:08 PM

Views: 193

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats