Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1966: CWE-522 Insufficiently Protected Credentials in YugabyteDB Inc YugabyteDB Anywhere

0
Low
VulnerabilityCVE-2026-1966cvecve-2026-1966cwe-522
Published: Thu Feb 05 2026 (02/05/2026, 11:38:28 UTC)
Source: CVE Database V5
Vendor/Project: YugabyteDB Inc
Product: YugabyteDB Anywhere

Description

CVE-2026-1966 is a low-severity vulnerability in YugabyteDB Anywhere versions 2024. 2. 0. 0 and 2025. 1. 0. 0 where LDAP bind passwords configured via gflags are displayed in cleartext within the web UI. An authenticated user with access to the configuration view can obtain these credentials, potentially enabling unauthorized access to external directory services. Exploitation requires high privileges and user interaction, limiting the attack surface. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/05/2026, 12:14:54 UTC

Technical Analysis

CVE-2026-1966 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting YugabyteDB Anywhere versions 2024.2.0.0 and 2025.1.0.0. The issue arises because LDAP bind passwords, which are configured via gflags, are displayed in cleartext within the product's web user interface. This means that any authenticated user who has access to the configuration view of YugabyteDB Anywhere can see these sensitive credentials without any obfuscation or encryption. LDAP bind credentials are critical because they allow the application to authenticate and query external directory services, such as Active Directory or OpenLDAP, which are often used for centralized authentication and authorization. If an attacker or unauthorized insider obtains these credentials, they could potentially access or manipulate directory services, leading to unauthorized access to user accounts or other resources. The vulnerability requires the attacker to have authenticated access with high privileges to the configuration UI, and user interaction is necessary to view the credentials. The CVSS 4.0 vector indicates a low base score of 2.4, reflecting the high attack complexity, required privileges, and user interaction. The scope is high, meaning the vulnerability could affect components beyond the initially vulnerable one if exploited. No public exploits or widespread attacks have been reported to date. The vulnerability primarily impacts confidentiality by exposing sensitive credentials, with limited direct impact on integrity or availability. The lack of patch links suggests that a fix may not yet be publicly available or is pending. Organizations using affected versions should consider this exposure seriously, especially in environments where LDAP credentials grant access to sensitive directory services.

Potential Impact

For European organizations, the exposure of LDAP bind credentials in YugabyteDB Anywhere could lead to unauthorized access to directory services, potentially compromising user authentication and authorization mechanisms. This could cascade into broader access control failures, allowing attackers or malicious insiders to escalate privileges or access sensitive data. Organizations relying heavily on LDAP for identity management, especially in regulated sectors such as finance, healthcare, and government, face increased risk of data breaches and compliance violations. The requirement for authenticated access and high privileges to exploit the vulnerability limits the likelihood of external attackers exploiting it directly; however, insider threats or compromised accounts could leverage this weakness. Additionally, unauthorized access to directory services could disrupt business operations or lead to lateral movement within networks. The impact on confidentiality is significant in environments where LDAP credentials provide broad access. Given the low CVSS score, the overall risk is moderate but should not be ignored in critical infrastructure or high-security contexts.

Mitigation Recommendations

1. Restrict access to the YugabyteDB Anywhere web UI configuration views strictly to trusted administrators with a need-to-know basis. 2. Implement strong authentication and session management controls to prevent unauthorized access to the UI. 3. Rotate LDAP bind credentials regularly and immediately after any suspected exposure. 4. Monitor LDAP and YugabyteDB logs for unusual authentication attempts or access patterns that could indicate credential misuse. 5. If possible, configure YugabyteDB Anywhere to avoid displaying sensitive credentials in cleartext or use environment variables or secure vaults to manage secrets. 6. Apply principle of least privilege to users who can access the configuration UI, minimizing the number of accounts with such access. 7. Follow vendor advisories closely for patches or updates addressing this vulnerability and apply them promptly once available. 8. Consider network segmentation to isolate YugabyteDB management interfaces from general user networks. 9. Educate administrators about the risks of credential exposure and enforce secure handling practices. 10. Use multi-factor authentication for access to the YugabyteDB Anywhere UI to reduce risk of compromised credentials being exploited.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Yugabyte
Date Reserved
2026-02-05T11:27:51.783Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69848649f9fa50a62f1d4e5e

Added to database: 2/5/2026, 12:00:09 PM

Last enriched: 2/5/2026, 12:14:54 PM

Last updated: 2/6/2026, 7:00:52 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats