CVE-2026-23906: CWE-287 Improper Authentication in Apache Software Foundation Apache Druid
Affected Products and Versions * Apache Druid * Affected Versions: 0.17.0 through 35.x (all versions prior to 36.0.0) * Prerequisites: * druid-basic-security extension enabled * LDAP authenticator configured * Underlying LDAP server permits anonymous bind Vulnerability Description An authentication bypass vulnerability exists in Apache Druid when using the druid-basic-security extension with LDAP authentication. If the underlying LDAP server is configured to allow anonymous binds, an attacker can bypass authentication by providing an existing username with an empty password. This allows unauthorized access to otherwise restricted Druid resources without valid credentials. The vulnerability stems from improper validation of LDAP authentication responses when anonymous binds are permitted, effectively treating anonymous bind success as valid user authentication. Impact A remote, unauthenticated attacker can: * Gain unauthorized access to the Apache Druid cluster * Access sensitive data stored in Druid datasources * Execute queries and potentially manipulate data * Access administrative interfaces if the bypassed account has elevated privileges * Completely compromise the confidentiality, integrity, and availability of the Druid deployment Mitigation Immediate Mitigation (No Druid Upgrade Required): * Disable anonymous bind on your LDAP server. This prevents the vulnerability from being exploitable and is the recommended immediate action. Resolution * Upgrade Apache Druid to version 36.0.0 or later, which includes fixes to properly reject anonymous LDAP bind attempts.
AI Analysis
Technical Summary
Apache Druid, a high-performance real-time analytics database, is affected by a critical authentication bypass vulnerability (CVE-2026-23906) in versions 0.17.0 through 35.x when the druid-basic-security extension is enabled with LDAP authentication. The root cause is improper handling of LDAP authentication responses when the underlying LDAP server allows anonymous binds. Specifically, if the LDAP server permits anonymous binding, an attacker can submit an existing username with an empty password, and the system incorrectly treats the anonymous bind success as valid authentication. This flaw allows remote, unauthenticated attackers to bypass authentication controls and gain unauthorized access to the Druid cluster. Once inside, attackers can access sensitive data stored in Druid datasources, execute arbitrary queries, manipulate data, and potentially access administrative interfaces if the compromised account has elevated privileges. This compromises the confidentiality, integrity, and availability of the entire Druid deployment. The vulnerability does not require any user interaction or prior authentication, making exploitation straightforward. The recommended immediate mitigation is to disable anonymous binds on the LDAP server, which prevents exploitation without requiring an immediate Druid upgrade. The definitive fix is included in Apache Druid version 36.0.0 and later, which properly rejects anonymous LDAP bind attempts during authentication. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Apache Druid with LDAP authentication and the druid-basic-security extension, this vulnerability poses a severe risk. Unauthorized attackers can remotely bypass authentication controls without credentials, leading to full compromise of sensitive analytics data and operational control. This can result in data breaches involving personal or business-critical information, manipulation or deletion of analytics data, disruption of business intelligence operations, and potential lateral movement within the network if administrative interfaces are accessed. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that rely on Druid for real-time analytics are particularly at risk. The breach of confidentiality and integrity could lead to regulatory non-compliance under GDPR and other data protection laws, resulting in legal and financial penalties. Availability impacts could disrupt decision-making processes and operational continuity. The ease of exploitation and lack of required authentication make this vulnerability attractive to attackers, increasing the likelihood of targeted attacks or opportunistic exploitation in Europe.
Mitigation Recommendations
1. Immediately disable anonymous bind capabilities on the LDAP servers used for Apache Druid authentication. This is the most effective short-term mitigation and does not require upgrading Druid. 2. Upgrade Apache Druid to version 36.0.0 or later as soon as possible, which includes a fix that properly rejects anonymous LDAP bind attempts and enforces correct authentication validation. 3. Audit LDAP server configurations regularly to ensure anonymous binds remain disabled and review access logs for suspicious bind attempts. 4. Implement network segmentation and access controls to limit exposure of the Druid cluster and LDAP servers to only trusted internal networks or VPNs. 5. Monitor Druid logs and query activity for unusual patterns that may indicate exploitation attempts or unauthorized access. 6. Employ multi-factor authentication (MFA) where possible on administrative interfaces to reduce risk if credentials are compromised. 7. Conduct security awareness and incident response drills focused on detecting and responding to authentication bypass scenarios. 8. Review and tighten role-based access controls within Druid to minimize privileges granted to users, limiting potential damage from compromised accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Switzerland
CVE-2026-23906: CWE-287 Improper Authentication in Apache Software Foundation Apache Druid
Description
Affected Products and Versions * Apache Druid * Affected Versions: 0.17.0 through 35.x (all versions prior to 36.0.0) * Prerequisites: * druid-basic-security extension enabled * LDAP authenticator configured * Underlying LDAP server permits anonymous bind Vulnerability Description An authentication bypass vulnerability exists in Apache Druid when using the druid-basic-security extension with LDAP authentication. If the underlying LDAP server is configured to allow anonymous binds, an attacker can bypass authentication by providing an existing username with an empty password. This allows unauthorized access to otherwise restricted Druid resources without valid credentials. The vulnerability stems from improper validation of LDAP authentication responses when anonymous binds are permitted, effectively treating anonymous bind success as valid user authentication. Impact A remote, unauthenticated attacker can: * Gain unauthorized access to the Apache Druid cluster * Access sensitive data stored in Druid datasources * Execute queries and potentially manipulate data * Access administrative interfaces if the bypassed account has elevated privileges * Completely compromise the confidentiality, integrity, and availability of the Druid deployment Mitigation Immediate Mitigation (No Druid Upgrade Required): * Disable anonymous bind on your LDAP server. This prevents the vulnerability from being exploitable and is the recommended immediate action. Resolution * Upgrade Apache Druid to version 36.0.0 or later, which includes fixes to properly reject anonymous LDAP bind attempts.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Apache Druid, a high-performance real-time analytics database, is affected by a critical authentication bypass vulnerability (CVE-2026-23906) in versions 0.17.0 through 35.x when the druid-basic-security extension is enabled with LDAP authentication. The root cause is improper handling of LDAP authentication responses when the underlying LDAP server allows anonymous binds. Specifically, if the LDAP server permits anonymous binding, an attacker can submit an existing username with an empty password, and the system incorrectly treats the anonymous bind success as valid authentication. This flaw allows remote, unauthenticated attackers to bypass authentication controls and gain unauthorized access to the Druid cluster. Once inside, attackers can access sensitive data stored in Druid datasources, execute arbitrary queries, manipulate data, and potentially access administrative interfaces if the compromised account has elevated privileges. This compromises the confidentiality, integrity, and availability of the entire Druid deployment. The vulnerability does not require any user interaction or prior authentication, making exploitation straightforward. The recommended immediate mitigation is to disable anonymous binds on the LDAP server, which prevents exploitation without requiring an immediate Druid upgrade. The definitive fix is included in Apache Druid version 36.0.0 and later, which properly rejects anonymous LDAP bind attempts during authentication. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Apache Druid with LDAP authentication and the druid-basic-security extension, this vulnerability poses a severe risk. Unauthorized attackers can remotely bypass authentication controls without credentials, leading to full compromise of sensitive analytics data and operational control. This can result in data breaches involving personal or business-critical information, manipulation or deletion of analytics data, disruption of business intelligence operations, and potential lateral movement within the network if administrative interfaces are accessed. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that rely on Druid for real-time analytics are particularly at risk. The breach of confidentiality and integrity could lead to regulatory non-compliance under GDPR and other data protection laws, resulting in legal and financial penalties. Availability impacts could disrupt decision-making processes and operational continuity. The ease of exploitation and lack of required authentication make this vulnerability attractive to attackers, increasing the likelihood of targeted attacks or opportunistic exploitation in Europe.
Mitigation Recommendations
1. Immediately disable anonymous bind capabilities on the LDAP servers used for Apache Druid authentication. This is the most effective short-term mitigation and does not require upgrading Druid. 2. Upgrade Apache Druid to version 36.0.0 or later as soon as possible, which includes a fix that properly rejects anonymous LDAP bind attempts and enforces correct authentication validation. 3. Audit LDAP server configurations regularly to ensure anonymous binds remain disabled and review access logs for suspicious bind attempts. 4. Implement network segmentation and access controls to limit exposure of the Druid cluster and LDAP servers to only trusted internal networks or VPNs. 5. Monitor Druid logs and query activity for unusual patterns that may indicate exploitation attempts or unauthorized access. 6. Employ multi-factor authentication (MFA) where possible on administrative interfaces to reduce risk if credentials are compromised. 7. Conduct security awareness and incident response drills focused on detecting and responding to authentication bypass scenarios. 8. Review and tighten role-based access controls within Druid to minimize privileges granted to users, limiting potential damage from compromised accounts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2026-01-19T08:57:10.063Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698afe6e4b57a58fa1f9010e
Added to database: 2/10/2026, 9:46:22 AM
Last enriched: 2/18/2026, 9:46:08 AM
Last updated: 3/27/2026, 2:16:05 PM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.