Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33413: CWE-862: Missing Authorization in etcd-io etcd

0
High
VulnerabilityCVE-2026-33413cvecve-2026-33413cwe-862
Published: Thu Mar 26 2026 (03/26/2026, 13:36:10 UTC)
Source: CVE Database V5
Vendor/Project: etcd-io
Product: etcd

Description

CVE-2026-33413 is a high-severity vulnerability in etcd versions prior to 3. 4. 42, 3. 5. 28, and 3. 6. 9 that allows unauthorized users to bypass authentication and authorization checks when the gRPC API is exposed to untrusted clients. Exploitation enables attackers to call sensitive etcd functions such as MemberList, Alarm, Lease APIs, and trigger compaction, potentially disrupting cluster operations, causing denial of service, and interfering with key management. Kubernetes deployments are generally not affected as they do not rely on etcd’s built-in auth. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 14:01:05 UTC

Technical Analysis

CVE-2026-33413 is a missing authorization vulnerability (CWE-862) in the etcd distributed key-value store affecting versions prior to 3.4.42, 3.5.28, and 3.6.9. etcd exposes a gRPC API for cluster management and data operations. When this API is accessible to untrusted or partially trusted clients, unauthorized users can bypass authentication and authorization controls. This allows them to invoke sensitive RPC calls such as MemberList, which reveals cluster topology including member IDs and endpoints; Alarm, which can be abused to disrupt operations or cause denial of service; Lease APIs, which interfere with TTL-based keys and lease ownership; and compaction operations that permanently remove historical data, disrupting watch, audit, and recovery workflows. The vulnerability does not require any authentication or user interaction and can be exploited remotely over the network. Kubernetes deployments are typically not affected because Kubernetes API servers handle authentication and authorization independently of etcd’s built-in mechanisms. The vulnerability has a CVSS 4.0 base score of 8.8, indicating high severity. Patches are available in versions 3.4.42, 3.5.28, and 3.6.9. If immediate upgrade is not feasible, mitigating exposure by restricting network access to etcd server ports and enforcing strong client identity at the transport layer (e.g., mTLS with tightly scoped client certificates) is recommended. This vulnerability highlights the critical importance of securing etcd clusters, especially those exposing their gRPC APIs beyond trusted internal networks.

Potential Impact

The impact of CVE-2026-33413 is significant for organizations using vulnerable etcd versions in distributed systems. Unauthorized access to etcd functions can lead to exposure of cluster topology, enabling attackers to map and target cluster members. Abuse of Alarm APIs can cause operational disruptions or denial of service, affecting availability. Manipulation of Lease APIs can interfere with key expiration and ownership, potentially causing data integrity issues or service disruptions. Triggering compaction can permanently delete historical revisions, undermining audit trails, watch mechanisms, and recovery processes, which impacts data integrity and operational resilience. Since etcd is a critical component in many cloud-native infrastructures and distributed systems, exploitation could lead to cascading failures or compromise of dependent services. Although Kubernetes typically mitigates this risk by handling auth externally, custom or non-standard deployments exposing etcd directly are at high risk. The vulnerability’s ease of exploitation without authentication or user interaction increases the threat level, especially in environments where network segmentation or strong transport layer security is lacking.

Mitigation Recommendations

1. Upgrade all etcd clusters to patched versions 3.4.42, 3.5.28, or 3.6.9 as soon as possible to eliminate the vulnerability. 2. If immediate upgrade is not feasible, restrict network access to etcd server ports (default 2379/2380) so that only trusted internal components can connect. Implement strict firewall rules and network segmentation to isolate etcd from untrusted networks. 3. Enforce strong client identity verification at the transport layer using mutual TLS (mTLS) with tightly scoped client certificates to ensure only authorized clients can communicate with etcd. 4. Audit existing etcd deployments to verify that the gRPC API is not exposed to untrusted or partially trusted clients. 5. Monitor etcd logs and network traffic for unusual calls to MemberList, Alarm, Lease, or compaction RPCs that could indicate exploitation attempts. 6. Review and harden operational procedures around lease management and compaction to detect and respond to anomalies quickly. 7. For Kubernetes users, confirm that the API server is properly configured to handle authentication and authorization, and that etcd is not directly exposed externally. 8. Incorporate vulnerability scanning and configuration checks for etcd in continuous security assessments and DevSecOps pipelines.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-19T17:02:34.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c53915f4197a8e3bcae392

Added to database: 3/26/2026, 1:48:05 PM

Last enriched: 3/26/2026, 2:01:05 PM

Last updated: 3/26/2026, 4:06:57 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses