Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`,
which is not a crypto-graphically secure random number generator. This
may allow an attacker to predict or brute force the secret used to sign
authentication cookies, potentially enabling token forgery or
authentication bypass. Additionally, each process generates its own
fallback secret, resulting in inconsistent secrets across nodes. This
causes authentication failures in distributed or multi-broker
deployments, effectively leading to a incorrectly configured clusters. Users are
advised to configure a strong `druid.auth.authenticator.kerberos.cookieSignatureSecret`
This issue affects Apache Druid: through 34.0.0.
Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set `druid.auth.authenticator.kerberos.cookieSignatureSecret` when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
References
| Link | Resource |
|---|---|
| https://lists.apache.org/thread/jwjltllnntgj1sb9wzsjmvwm9f8rlhg8 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/11/26/1 | Mailing List Third Party Advisory |
Configurations
History
04 Dec 2025, 16:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:* | |
| References | () https://lists.apache.org/thread/jwjltllnntgj1sb9wzsjmvwm9f8rlhg8 - Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2025/11/26/1 - Mailing List, Third Party Advisory | |
| First Time |
Apache druid
Apache |
26 Nov 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| Summary |
|
26 Nov 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-26 09:15
Updated : 2025-12-04 16:09
NVD link : CVE-2025-59390
Mitre link : CVE-2025-59390
CVE.ORG link : CVE-2025-59390
JSON object : View
Products Affected
apache
- druid
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
