Impact
In Strimzi Kafka operator versions 0.49.0 through 0.50.0, a custom multistage CA chain is incorrectly configured to trust every certificate authority in the chain for mutual TLS authentication. This permits any user certificate signed by any CA in the chain to authenticate successfully. The vulnerability results in unauthorized access to Kafka internals and user-configured listeners, effectively bypassing intended authentication controls.
Affected Systems
The affected product is Strimzi Kafka operator. Versions 0.49.0 through 0.50.0 that use a custom Cluster or Clients CA with a multistage CA chain are impacted. Single‑CA custom CAs or Strimzi‑managed CAs are not affected.
Risk and Exploitability
The CVSS score of 8.1 indicates high severity. The EPSS score is less than 1%, suggesting the likelihood of exploitation is currently low, but the vulnerability is not listed in the CISA KEV catalog. An attacker would need access to a client certificate signed by any CA in the custom chain, which is feasible if the CA hierarchy is exposed or misused. Trusted CAs are incorrectly accepted, making it possible to impersonate legitimate users without knowledge of the primary CA.
OpenCVE Enrichment