Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2817: CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory in VMware Spring Data Geode

0
Medium
VulnerabilityCVE-2026-2817cvecve-2026-2817cwe-538cwe-378cwe-379
Published: Thu Feb 19 2026 (02/19/2026, 17:18:09 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: Spring Data Geode

Description

CVE-2026-2817 is a medium-severity vulnerability in VMware Spring Data Geode 2. 0. 0. RELEASE where snapshot import extracts archives into predictable, permissive directories under the system temp location. This insecure directory usage allows local users on shared hosts with basic privileges to access other users’ extracted snapshot contents, potentially exposing sensitive cache data. The vulnerability does not require user interaction but does require local privileges. There are no known exploits in the wild yet. The CVSS score is 4. 4, reflecting limited confidentiality and integrity impact without availability impact. Organizations using Spring Data Geode in multi-tenant or shared environments should be cautious.

AI-Powered Analysis

AILast updated: 02/19/2026, 19:01:36 UTC

Technical Analysis

CVE-2026-2817 is a vulnerability identified in VMware Spring Data Geode version 2.0.0.RELEASE involving the insecure handling of snapshot import operations. Specifically, when importing snapshots, the software extracts archive contents into directories located under the system's temporary folder. These directories are predictable in name and have permissive access controls, which means that on shared hosting environments or multi-user systems, a local user with limited privileges can access the extracted snapshot data belonging to other users. This exposure can lead to unintended disclosure of sensitive cache data stored within these snapshots. The vulnerability is categorized under CWE-538 (Insertion of Sensitive Information into Externally-Accessible File or Directory), CWE-378 (Creation of Temporary File with Insecure Permissions), and CWE-379 (Creation of File with Insecure Permissions). The CVSS v3.1 score of 4.4 reflects that the attack vector is local (AV:L), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent (C:L, I:L), but does not affect availability (A:N). There are no known exploits in the wild, and no patches have been linked yet. The vulnerability primarily affects environments where multiple users share the same host or system, such as cloud or containerized deployments, where isolation of temporary directories is not enforced. This flaw can lead to data leakage between tenants or users, violating data confidentiality and potentially undermining trust in the system's data isolation mechanisms.

Potential Impact

The primary impact of CVE-2026-2817 is the unintended exposure of sensitive cache data stored in Spring Data Geode snapshots on shared systems. This can lead to confidentiality breaches where local users gain unauthorized access to other users’ data, potentially exposing sensitive business or personal information cached within the system. Integrity impact is also possible if an attacker modifies snapshot contents, although this is less likely given the read access focus. Availability is not affected. Organizations using Spring Data Geode in multi-tenant environments, shared hosting, or cloud platforms where multiple users or containers share the same underlying OS are at risk. Data leakage can lead to compliance violations, reputational damage, and potential legal consequences. While exploitation requires local access, the low privilege requirement and lack of user interaction make it easier for malicious insiders or compromised accounts to leverage this vulnerability. The absence of known exploits suggests limited current threat but does not preclude future attacks, especially as awareness grows.

Mitigation Recommendations

To mitigate CVE-2026-2817, organizations should implement the following specific measures: 1) Configure Spring Data Geode or the underlying system to extract snapshot archives into user-specific or otherwise isolated directories rather than shared or predictable temp locations. 2) Enforce strict file system permissions on temporary directories to restrict access only to the owning user or process. 3) Use containerization or virtualization techniques to isolate environments and prevent cross-user access on shared hosts. 4) Monitor and audit access to temporary directories and snapshot files to detect unauthorized access attempts. 5) Apply principle of least privilege to local user accounts to minimize risk of exploitation. 6) Stay updated with VMware advisories and apply patches or updates once available. 7) Consider implementing encryption for snapshot data at rest to reduce impact if files are accessed. 8) Review and harden system-wide temporary directory permissions and usage policies to prevent similar issues. These steps go beyond generic advice by focusing on directory isolation, permission hardening, and operational monitoring tailored to the vulnerability’s nature.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
HeroDevs
Date Reserved
2026-02-19T17:07:39.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69975ab1d7880ec89b287d18

Added to database: 2/19/2026, 6:47:13 PM

Last enriched: 2/19/2026, 7:01:36 PM

Last updated: 2/19/2026, 9:25:38 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats