Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-41081: CWE-287 Improper Authentication in Apache Software Foundation Apache Storm Client

0
Medium
VulnerabilityCVE-2026-41081cvecve-2026-41081cwe-287
Published: Mon Apr 27 2026 (04/27/2026, 13:10:45 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Storm Client

Description

Improper Handling of TLS Client Authentication Failure Leading to Anonymous Principal Assignment in Apache Storm Versions Affected: up to 2.8.7 Description: When TLS transport is enabled in Apache Storm without requiring client certificate authentication (the default configuration), the TlsTransportPlugin assigns a fallback principal (CN=ANONYMOUS) if no client certificate is presented or if certificate verification fails. The underlying SSLPeerUnverifiedException is caught and suppressed rather than rejecting the connection. This fail-open behavior means an unauthenticated client can establish a TLS connection and receive a valid principal identity. If the configured authorizer (e.g., SimpleACLAuthorizer) does not explicitly deny access to CN=ANONYMOUS, this may result in unauthorized access to Storm services. The condition is logged at debug level only, reducing visibility in production. Impact: Unauthenticated clients may be assigned a principal identity, potentially bypassing authorization in permissive or misconfigured environments. Mitigation: Users should upgrade to 2.8.7 in which TLS authentication failures are handled in a fail-closed manner. Users who cannot upgrade immediately should: - Enable mandatory client certificate authentication (nimbus.thrift.tls.client.auth.required: true) - Ensure authorization rules explicitly deny access to CN=ANONYMOUS - Review all ACL configurations for implicit default-allow behavior

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/27/2026, 13:45:41 UTC

Technical Analysis

Apache Storm Client versions up to 2.8.7 exhibit a vulnerability (CVE-2026-41081) due to improper handling of TLS client authentication failures. When TLS is enabled without requiring client certificates (default setting), the TlsTransportPlugin assigns a fallback principal CN=ANONYMOUS if no client certificate is presented or verification fails. Instead of rejecting the connection, the SSLPeerUnverifiedException is caught and suppressed, allowing unauthenticated clients to connect with a valid principal identity. If the authorization configuration does not explicitly deny access to CN=ANONYMOUS, unauthorized access to Storm services may occur. The issue is logged only at debug level, reducing detection likelihood. The vulnerability is fixed in Apache Storm 2.8.7 by enforcing fail-closed behavior on TLS authentication failures. Users unable to upgrade immediately should enable mandatory client certificate authentication and ensure ACLs deny CN=ANONYMOUS access.

Potential Impact

Unauthenticated clients can be assigned a valid principal identity (CN=ANONYMOUS) due to fail-open TLS authentication handling, potentially bypassing authorization controls in permissive or misconfigured environments. This may lead to unauthorized access to Apache Storm services if authorization rules do not explicitly deny the anonymous principal. The vulnerability reduces the effectiveness of TLS client authentication and weakens access control enforcement.

Mitigation Recommendations

A fix is available in Apache Storm version 2.8.7, which handles TLS authentication failures in a fail-closed manner. Users should upgrade to this version to fully remediate the issue. For those unable to upgrade immediately, it is recommended to enable mandatory client certificate authentication by setting nimbus.thrift.tls.client.auth.required to true, explicitly deny access to the CN=ANONYMOUS principal in authorization rules, and review all ACL configurations to avoid implicit default-allow permissions. These steps help mitigate unauthorized access risks until the official fix is applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-04-16T17:22:43.617Z
Cvss Version
null
State
PUBLISHED
Remediation Level
null

Threat ID: 69ef64deba26a39fba2863cb

Added to database: 4/27/2026, 1:30:06 PM

Last enriched: 4/27/2026, 1:45:41 PM

Last updated: 4/27/2026, 3:37:26 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses