CVE-2025-66623

Strimzi · Strimzi (running on Kubernetes/OpenShift)

A high-severity vulnerability has been identified in Strimzi, a platform for managing Apache Kafka clusters on Kubernetes.

Executive summary

A high-severity vulnerability has been identified in Strimzi, a platform for managing Apache Kafka clusters on Kubernetes. This flaw could allow an attacker with limited access to a Kubernetes cluster to escalate their privileges, potentially leading to a complete compromise of the cluster. Successful exploitation could result in unauthorized access to sensitive data streams, service disruption, and lateral movement across the network.

Vulnerability

This vulnerability is an improper authorization flaw within the Strimzi Operator. An attacker with permissions to create or modify Strimzi Custom Resource Definitions (CRDs), such as KafkaTopic or KafkaUser, can craft a malicious resource definition. When the Strimzi Operator processes this malicious CRD, it fails to properly sanitize and validate the inputs, leading to the execution of commands or the granting of permissions with the operator's own elevated service account privileges. This allows the attacker to bypass standard Kubernetes Role-Based Access Control (RBAC) and escalate their privileges within the cluster, potentially to a cluster-admin level.

Business impact

This is a High severity vulnerability with a CVSS score of 7.4, posing a significant risk to the organization's cloud-native infrastructure. Exploitation could lead to a complete takeover of the Kubernetes cluster where Strimzi is deployed. The direct business impacts include a high risk of a data breach, as an attacker could gain access to all data managed by Kafka and other applications in the cluster. Furthermore, the attacker could disrupt critical services by deleting or altering cluster resources, leading to operational downtime and financial loss. A compromised cluster could also serve as a foothold for attackers to move laterally into other parts of the corporate network.

Remediation

Immediate Action: Apply vendor security updates immediately. System administrators should identify all instances of Strimzi within their environments and upgrade them to the patched version as specified in the official vendor advisory. Following the update, monitor for any signs of exploitation attempts and conduct a thorough review of Kubernetes API server and Strimzi operator access logs for any anomalous activity preceding the patch.

Proactive Monitoring: Implement enhanced monitoring of the Kubernetes API server logs, specifically looking for unusual or frequent modifications to Strimzi CRDs from low-privileged accounts. Monitor for unexpected changes to ClusterRoleBindings and RoleBindings, especially those associated with Strimzi-related service accounts. Alert on any anomalous network traffic or shell executions originating from Strimzi Operator or Kafka broker pods.

Compensating Controls: If patching cannot be performed immediately, implement the following controls:

  • Restrict CRD Access: Tightly scope RBAC permissions to ensure that only highly-trusted administrators can create, update, or delete Strimzi CRDs.
  • Admission Controllers: Utilize a policy admission controller like OPA/Gatekeeper or Kyverno to create policies that reject Strimzi CRDs containing suspicious or known-malicious configurations.
  • Network Policies: Apply strict Kubernetes NetworkPolicies to limit the network access of Strimzi pods, preventing them from communicating with unexpected internal or external endpoints.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity (CVSS 7.4) of this vulnerability and its potential for complete cluster compromise, immediate remediation is strongly advised. Although CVE-2025-66623 is not currently on the CISA KEV list, its impact makes it a prime candidate for future inclusion should widespread exploitation occur. Organizations must prioritize applying the vendor security updates across all affected environments. If patching is delayed, the compensating controls outlined above, particularly the restriction of CRD permissions, should be implemented as a matter of urgency to mitigate immediate risk.