Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
SOCs & MSSPs Prevent Phishing Missed Incidents Email
May 13, 2026
Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges
May 13, 2026
Foxconn Confirms Cyberattack by Nitrogen Ransomware Gang
May 13, 2026
Home/CyberSecurity News/Critical etcd Auth Bypass Flaw Enables Unauthorized API Access
CyberSecurity News

Critical etcd Auth Bypass Flaw Enables Unauthorized API Access

A critical authentication bypass vulnerability has been identified in etcd, the foundational distributed key-value store underpinning countless cloud-native systems and Kubernetes clusters globally....

Sarah simpson
Sarah simpson
April 14, 2026 2 Min Read
4 0

A critical authentication bypass vulnerability has been identified in etcd, the foundational distributed key-value store underpinning countless cloud-native systems and Kubernetes clusters globally.

Tracked as CVE-2026-33413, this high-severity flaw carries a CVSS score of 8.8. It enables attackers to access highly sensitive cluster APIs without proper authorization.

An autonomous artificial intelligence pentesting agent named Strix discovered this broken access-control vulnerability by analyzing the project’s open-source repository.

The discovery highlights a significant oversight in how the system handles specific remote procedure calls.

Critical etcd Auth Bypass Vulnerability

Threat actors only require basic network access to the etcd client gRPC endpoint, typically exposed on port 2379, to exploit this security gap.

Once connected, an unauthenticated user or an underprivileged account can invoke powerful backend methods without needing administrative tokens.

The backend applier processes these requests directly because it incorrectly assumes the required authorization checks were performed earlier in the pipeline.

The vulnerability specifically exposes three critical operations to unauthorized users:

  • The Maintenance. The alarm method allows attackers to maliciously trigger or clear vital cluster alarms, such as those indicating out-of-space errors or corrupt data states.
  • The KV.A compact method forces premature database compaction, permanently deleting historical data states and potentially triggering a denial-of-service attack through massive resource consumption.
  • The Lease. The LeaseGrant method allows unauthenticated callers to continuously generate new system leases, ultimately exhausting available server memory and causing the affected node to crash.

The fundamental flaw exists within the etcd server architecture, which relies on a sequential chain of appliers to process incoming requests.

When administrators turn on cluster authentication, a specialized wrapper called authApplierV3 intercepts traffic to enforce user permissions.

This security wrapper successfully verifies credentials for standard data operations, including database writes, range queries, and user management.

Unfortunately, the developers failed to implement explicit overrides for several maintenance functions. Because the security wrapper embeds the interface containing these overlooked methods, the system passes the calls straight through to the execution backend.

The remote procedure call handlers forward the requests directly to the Raft consensus module, meaning the commands execute immediately without any secondary credential verification.

Verification and Security Patch

The Strix AI agent proved the exploitability of this flaw by autonomously spinning up a local test environment with authentication actively enforced.

By connecting as an anonymous client, the agent successfully bypassed all security controls, triggering alarms, forcing database compactions, and generating memory-consuming leases.

This end-to-end proof of concept validated that the vulnerability was a true positive with immediate real-world impact. The etcd security team responded rapidly to the private disclosure filed on March 3, 2026.

They validated the agent’s findings and implemented missing authentication guardrails to ensure these maintenance methods verify administrative permissions before executing.

System administrators must urgently apply the March 2026 security release to protect their distributed infrastructure from unauthorized access.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical FortiSandbox Flaws Allow Unauthorized Command Execution

Next Post

Ivanti Neurons ITSM Flaws Allow Remote User Vulnerabilities Attacker

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Critical Exim BDAT GnuTLS Flaw Vulnerability Enables
May 13, 2026
Google Boosts Android Mobile Security with New AI Protections
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us