Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22048: 918 in NETAPP StorageGRID (formerly StorageGRID Webscale)

0
High
VulnerabilityCVE-2026-22048cvecve-2026-22048
Published: Tue Feb 17 2026 (02/17/2026, 23:01:30 UTC)
Source: CVE Database V5
Vendor/Project: NETAPP
Product: StorageGRID (formerly StorageGRID Webscale)

Description

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4 with Single Sign-on enabled and configured to use Microsoft Entra ID (formerly Azure AD) as an IdP are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. Successful exploit could allow an authenticated attacker with low privileges to delete configuration data or deny access to some resources.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/25/2026, 00:14:41 UTC

Technical Analysis

CVE-2026-22048 is a Server-Side Request Forgery (SSRF) vulnerability identified in NETAPP StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4. This vulnerability specifically affects deployments where Single Sign-on (SSO) is enabled and configured to use Microsoft Entra ID (formerly Azure AD) as the identity provider (IdP). SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended locations, potentially accessing or modifying internal resources. In this case, an authenticated attacker with low privileges can exploit the SSRF flaw to delete configuration data or deny access to some resources within the StorageGRID environment. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The attacker must have some level of privileges (PR:L) but does not need to trick a user (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The impact affects integrity (I:L) and availability (A:H) but not confidentiality. The vulnerability is tracked under CWE-918 (Server-Side Request Forgery). No public exploits are known at this time, but the potential for disruption to critical storage infrastructure is significant. The lack of patch links suggests that fixes may be pending or recently released, so organizations should monitor vendor advisories closely. This vulnerability highlights the risks introduced by integrating third-party identity providers and the importance of validating server-side requests in complex authentication flows.

Potential Impact

The impact of CVE-2026-22048 is primarily on the integrity and availability of StorageGRID configurations and resources. Successful exploitation allows an attacker with low privileges to delete configuration data, which could disrupt storage operations, cause misconfigurations, or lead to denial of service for users relying on the StorageGRID system. Since StorageGRID is often used for large-scale object storage in enterprise and cloud environments, disruption could affect data accessibility and business continuity. The vulnerability does not expose confidential data directly but could indirectly impact operations that rely on the integrity of configuration settings. Organizations using StorageGRID with Microsoft Entra ID SSO are at risk of targeted attacks that could degrade service availability or cause operational outages. The ease of exploitation and network accessibility increase the likelihood of exploitation attempts, especially in environments where attackers have some authenticated access. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details become widely known. Overall, the vulnerability poses a high risk to organizations dependent on StorageGRID for critical storage infrastructure, potentially affecting cloud service providers, large enterprises, and government agencies.

Mitigation Recommendations

To mitigate CVE-2026-22048, organizations should: 1) Immediately verify if their StorageGRID deployments are running affected versions prior to 11.9.0.12 or 12.0.0.4 with Single Sign-on enabled and configured to use Microsoft Entra ID. 2) Apply vendor-provided patches or updates as soon as they become available; monitor NETAPP advisories for official fixes. 3) If patches are not yet available, consider temporarily disabling Single Sign-on integration with Microsoft Entra ID or restricting access to the StorageGRID management interfaces to trusted networks only. 4) Implement strict network segmentation and firewall rules to limit internal server requests and reduce SSRF attack surface. 5) Audit and monitor logs for unusual deletion or access patterns related to configuration data. 6) Enforce least privilege principles for authenticated users to minimize potential damage from low-privilege accounts. 7) Review and harden the configuration of the SSO integration to ensure proper validation of incoming requests and tokens. 8) Conduct penetration testing focused on SSRF vectors in the environment to identify any residual weaknesses. These steps go beyond generic advice by focusing on configuration review, network controls, and proactive monitoring tailored to the specific integration and vulnerability context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
netapp
Date Reserved
2026-01-05T22:47:18.701Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6994f69980d747be20df4357

Added to database: 2/17/2026, 11:15:37 PM

Last enriched: 2/25/2026, 12:14:41 AM

Last updated: 4/5/2026, 2:33:54 AM

Views: 307

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses