HomeLinuxfoundationCVE-2026-27133

CVE-2026-27133

MEDIUM
5.9CVSS
Published: 2026-02-20
Updated: 2026-02-27
AI Analysis

Description

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 to before 0.50.1, when a chain consisting of multiple CA (Certificate Authority) certificates is used in the trusted certificates configuration of a Kafka Connect operand or of the target cluster in the Kafka MirrorMaker 2 operand, all of the certificates that are part of the CA chain will be trusted individually when connecting to the Apache Kafka cluster. Due to this error, the affected operand (Kafka Connect or Kafka MirrorMaker 2) might accept connections to Kafka brokers using server certificates signed by one of the other CAs in the CA chain and not just by the last CA in the chain. This issue is fixed in Strimzi 0.50.1.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
high
Privileges
high
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-295CWE-296

Metadata

Primary Vendor
LINUXFOUNDATION
Published
2/20/2026
Last Modified
2/27/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

linuxfoundation : strimzi

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-27133 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com