Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27133: CWE-295: Improper Certificate Validation in strimzi strimzi-kafka-operator

0
Medium
VulnerabilityCVE-2026-27133cvecve-2026-27133cwe-295cwe-296
Published: Fri Feb 20 2026 (02/20/2026, 22:38:27 UTC)
Source: CVE Database V5
Vendor/Project: strimzi
Product: strimzi-kafka-operator

Description

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 to before 0.50.1, when a chain consisting of multiple CA (Certificate Authority) certificates is used in the trusted certificates configuration of a Kafka Connect operand or of the target cluster in the Kafka MirrorMaker 2 operand, all of the certificates that are part of the CA chain will be trusted individually when connecting to the Apache Kafka cluster. Due to this error, the affected operand (Kafka Connect or Kafka MirrorMaker 2) might accept connections to Kafka brokers using server certificates signed by one of the other CAs in the CA chain and not just by the last CA in the chain. This issue is fixed in Strimzi 0.50.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:39:31 UTC

Technical Analysis

Strimzi is an open-source operator that facilitates running Apache Kafka clusters on Kubernetes or OpenShift. Versions 0.47.0 through 0.50.0 of the strimzi-kafka-operator contain a certificate validation vulnerability (CVE-2026-27133) classified under CWE-295 (Improper Certificate Validation) and CWE-296. When configuring trusted certificates for Kafka Connect or Kafka MirrorMaker 2 operands, if a chain of multiple Certificate Authority (CA) certificates is used, the operator incorrectly trusts each CA certificate in the chain individually rather than only the root or final CA. This means that server certificates signed by any intermediate CA in the chain are accepted as valid when connecting to Kafka brokers, instead of restricting trust to certificates signed by the designated root CA. This improper validation undermines the trust model of TLS connections, potentially allowing an attacker who can present a certificate signed by an intermediate CA in the chain to impersonate Kafka brokers or intercept traffic. Exploitation requires high privileges on the cluster to modify the CA chain configuration but does not require user interaction. The vulnerability affects all deployments using the specified Strimzi versions with multi-CA chains in Kafka Connect or MirrorMaker 2 configurations. The issue was addressed and fixed in Strimzi version 0.50.1 by correcting the certificate validation logic to trust only the final CA in the chain as intended.

Potential Impact

The vulnerability can lead to unauthorized acceptance of server certificates signed by intermediate CAs, enabling man-in-the-middle (MITM) attacks or unauthorized broker impersonation. This compromises the confidentiality and integrity of Kafka cluster communications, potentially exposing sensitive data streams or allowing injection of malicious data. Organizations relying on Strimzi for Kafka orchestration in Kubernetes or OpenShift environments face risks of data breaches and operational disruption. Since Kafka is often used for critical data pipelines, this vulnerability could affect data analytics, financial transactions, or other sensitive workloads. The requirement for high privileges to exploit limits the attack surface to insiders or attackers who have already compromised cluster credentials. However, the widespread use of Strimzi in cloud-native environments means that many organizations globally could be impacted if they run vulnerable versions and use multi-CA chains. No known exploits are reported in the wild yet, but the medium CVSS score reflects a moderate risk that should be addressed promptly.

Mitigation Recommendations

The primary mitigation is to upgrade the strimzi-kafka-operator to version 0.50.1 or later, where the certificate validation logic is corrected. Until upgrade is possible, organizations should avoid using multiple CA certificates in the trusted CA chain configuration for Kafka Connect and MirrorMaker 2 operands, limiting to a single trusted CA certificate to reduce risk. Review and audit the CA chain configurations to ensure only intended root CAs are trusted. Implement strict access controls to limit who can modify Strimzi configurations and CA chains, reducing the risk of privilege abuse. Monitor Kafka broker connections and TLS certificate usage for anomalies that could indicate misuse of intermediate CA certificates. Employ network segmentation and zero-trust principles around Kafka clusters to limit exposure. Finally, maintain up-to-date backups and incident response plans in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.044Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f753

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/28/2026, 12:39:31 AM

Last updated: 4/7/2026, 8:27:32 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses