📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Cloud Services / Email HIGH 23m Global general Cybersecurity Technology LOW 35m Global vulnerability Cloud Services and Identity Management HIGH 2h Global data_breach Healthcare CRITICAL 2h Global vulnerability Operating Systems and Software HIGH 3h Global phishing Financial Services HIGH 9h Global supply_chain Software Development and Technology CRITICAL 11h Global apt Multiple sectors HIGH 12h Global phishing Telecommunications and General Public HIGH 13h Global apt Government and Critical Infrastructure CRITICAL 13h Global vulnerability Cloud Services / Email HIGH 23m Global general Cybersecurity Technology LOW 35m Global vulnerability Cloud Services and Identity Management HIGH 2h Global data_breach Healthcare CRITICAL 2h Global vulnerability Operating Systems and Software HIGH 3h Global phishing Financial Services HIGH 9h Global supply_chain Software Development and Technology CRITICAL 11h Global apt Multiple sectors HIGH 12h Global phishing Telecommunications and General Public HIGH 13h Global apt Government and Critical Infrastructure CRITICAL 13h Global vulnerability Cloud Services / Email HIGH 23m Global general Cybersecurity Technology LOW 35m Global vulnerability Cloud Services and Identity Management HIGH 2h Global data_breach Healthcare CRITICAL 2h Global vulnerability Operating Systems and Software HIGH 3h Global phishing Financial Services HIGH 9h Global supply_chain Software Development and Technology CRITICAL 11h Global apt Multiple sectors HIGH 12h Global phishing Telecommunications and General Public HIGH 13h Global apt Government and Critical Infrastructure CRITICAL 13h
Vulnerabilities

CVE-2026-33413

High
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call c
CWE-862 — Weakness Type
Published: Mar 26, 2026  ·  Modified: Apr 2, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or partially trusted clients. In unpatched etcd clusters with etcd auth enabled, unauthorized users are able to call MemberList and learn cluster topology, including member IDs and advertised endpoints; call Alarm, which can be abused for operational disruption or denial of service; use Lease APIs, interfering with TTL-based keys and lease ownership; and/or trigger compaction, permanently removing historical revisions and disrupting watch, audit, and recovery workflows. Kubernetes does not rely on etcd’s built-in authentication and authorization. Instead, the API server handles authentication and authorization itself, so typical Kubernetes deployments are not affected. Versions 3.4.42, 3.5.28, and 3.6.9 contain a patch. If upgrading is not immediately possible, reduce exposure by treating the affected RPCs as unauthenticated in practice. Restrict network access to etcd server ports so only trusted components can connect and/or require strong client identity at the transport layer, such as mTLS with tightly scoped client certificate distribution.

🤖 AI Executive Summary

CVE-2026-33413 is a critical authentication bypass vulnerability in etcd versions prior to 3.4.42, 3.5.28, and 3.6.9 that allows unauthorized users to access sensitive cluster operations including topology discovery, lease manipulation, and compaction. This affects etcd clusters with authentication enabled that expose gRPC APIs to untrusted networks. While Kubernetes deployments are typically protected by API server-level authentication, standalone etcd deployments and non-Kubernetes distributed systems are at significant risk of operational disruption and data integrity compromise.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 23, 2026 05:19
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations operating distributed systems and cloud infrastructure are at high risk, particularly: (1) Banking sector (SAMA-regulated institutions) using etcd for microservices and transaction ledgers; (2) Government agencies (NCA oversight) deploying etcd in critical infrastructure; (3) Telecommunications providers (STC, Mobily) using etcd for network configuration and service discovery; (4) Energy sector (ARAMCO, SEC) utilizing etcd in SCADA and operational technology systems; (5) Healthcare organizations managing patient data across distributed systems. The vulnerability enables cluster topology disclosure, operational denial of service, and historical data destruction—directly impacting business continuity and regulatory compliance.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Telecommunications Energy and Utilities Healthcare Cloud Service Providers Critical Infrastructure
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Inventory all etcd deployments across your infrastructure and identify versions prior to 3.4.42, 3.5.28, and 3.6.9
2. Assess network exposure: determine if etcd gRPC ports (default 2379-2380) are accessible from untrusted networks
3. Review etcd authentication configuration and audit logs for unauthorized access attempts

PATCHING GUIDANCE:
1. Upgrade etcd to patched versions: 3.4.42, 3.5.28, 3.6.9 or later immediately
2. Plan upgrades during maintenance windows with zero-downtime rolling updates where possible
3. Test patches in non-production environments first
4. Verify cluster health and member status post-upgrade

COMPENSATING CONTROLS (if immediate patching not possible):
1. Implement network segmentation: restrict etcd server port access (2379-2380) to only trusted components using firewall rules
2. Deploy mTLS (mutual TLS) with tightly scoped client certificates for all etcd connections
3. Disable or restrict access to vulnerable RPC methods: MemberList, Alarm, Lease APIs, and Compact operations
4. Implement API gateway or proxy layer with additional authentication/authorization checks
5. Monitor and log all etcd API calls for anomalous access patterns

DETECTION RULES:
1. Alert on MemberList RPC calls from unauthorized sources
2. Monitor for Alarm RPC invocations outside normal operational windows
3. Track Lease API modifications and compaction operations
4. Detect gRPC connections from unexpected network segments
5. Flag authentication failures followed by successful RPC execution
6. Monitor etcd audit logs for privilege escalation patterns
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. قم بحصر جميع نشرات etcd عبر البنية التحتية الخاصة بك وحدد الإصدارات السابقة للإصدارات 3.4.42 و 3.5.28 و 3.6.9
2. قيّم التعرض للشبكة: حدد ما إذا كانت منافذ gRPC الخاصة بـ etcd (الافتراضية 2379-2380) يمكن الوصول إليها من الشبكات غير الموثوقة
3. راجع تكوين المصادقة في etcd وسجلات التدقيق لمحاولات الوصول غير المصرح به

إرشادات التصحيح:
1. قم بترقية etcd إلى الإصدارات المصححة: 3.4.42 و 3.5.28 و 3.6.9 أو أحدث على الفور
2. خطط للترقيات أثناء نوافذ الصيانة مع تحديثات متدرجة بدون توقف حيث أمكن
3. اختبر التصحيحات في بيئات غير الإنتاج أولاً
4. تحقق من صحة المجموعة وحالة العضو بعد الترقية

الضوابط التعويضية (إذا لم يكن التصحيح الفوري ممكناً):
1. تنفيذ تقسيم الشبكة: تقييد الوصول إلى منفذ خادم etcd (2379-2380) فقط للمكونات الموثوقة باستخدام قواعد جدار الحماية
2. نشر mTLS (TLS المتبادل) مع شهادات عميل محدودة النطاق لجميع اتصالات etcd
3. تعطيل أو تقييد الوصول إلى طرق RPC الضعيفة: MemberList و Alarm و Lease APIs وعمليات Compact
4. تنفيذ بوابة API أو طبقة وكيل مع فحوصات مصادقة/تفويض إضافية
5. مراقبة وتسجيل جميع استدعاءات API الخاصة بـ etcd للأنماط الشاذة

قواعد الكشف:
1. تنبيه على استدعاءات MemberList RPC من مصادر غير مصرح بها
2. مراقبة استدعاءات Alarm RPC خارج نوافذ التشغيل العادية
3. تتبع تعديلات Lease API وعمليات الضغط
4. كشف اتصالات gRPC من قطاعات شبكة غير متوقعة
5. وضع علم على فشل المصادقة متبوعاً بتنفيذ RPC ناجح
6. مراقبة سجلات تدقيق etcd لأنماط تصعيد الامتيازات
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policies (authentication bypass) ECC 2024 A.5.2.1 - User Registration and Access Rights Management ECC 2024 A.5.3.1 - Management of Privileged Access Rights ECC 2024 A.8.2.1 - User Access Management ECC 2024 A.12.4.1 - Event Logging (audit trail disruption)
🔵 SAMA CSF
SAMA CSF ID.AM-1 - Asset Management (inventory etcd deployments) SAMA CSF PR.AC-1 - Access Control Policy (authentication enforcement) SAMA CSF PR.AC-3 - Access Enforcement (authorization bypass) SAMA CSF DE.CM-1 - Detection and Analysis (monitoring unauthorized access) SAMA CSF RC.CO-2 - Incident Recovery (historical data loss from compaction)
🟡 ISO 27001:2022
ISO 27001:2022 A.5.2 - Information Security Policies ISO 27001:2022 A.6.2 - Access to Information and Other Associated Assets ISO 27001:2022 A.8.2 - User Access Management ISO 27001:2022 A.8.3 - Management of Supplier Access ISO 27001:2022 A.12.4 - Logging (audit trail integrity)
🟣 PCI DSS v4.0
PCI DSS 2.1 - Default Security Parameters (etcd authentication) PCI DSS 7.1 - Access Control Implementation (least privilege) PCI DSS 8.1 - User Identification and Authentication PCI DSS 10.2 - Logging and Monitoring (audit log integrity)
📦 Affected Products / CPE 3 entries
etcd:etcd
etcd:etcd
etcd:etcd
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-862
EPSS0.05%
Exploit No
Patch ✗ No
Published 2026-03-26
Source Feed nvd
Views 5
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-862
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.