Etcd authentication bypass (CVE-2026-33413)
CVE-2026-33413
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call c...
Overview
A significant security vulnerability, tracked as CVE-2026-33413, has been identified in etcd, a critical distributed key-value store used by many systems, including Kubernetes. This flaw is an authentication bypass that affects clusters with etcd’s built-in authentication enabled. Unauthorized users can exploit it to perform unauthorized actions without proper credentials.
Vulnerability Details
In affected versions (prior to 3.4.42, 3.5.28, and 3.6.9), the vulnerability exists in the gRPC API. When this API is exposed to untrusted or partially trusted clients, attackers can bypass authentication and authorization checks to call specific etcd functions. This bypass occurs even when etcd’s own “auth” feature is turned on.
Potential Impact
The impact of successful exploitation is severe and can lead to:
- Information Disclosure: Attackers can call the
MemberListfunction to learn the internal topology of the cluster, including member IDs and network endpoints. - Operational Disruption: By calling the
Alarmfunction, an attacker can trigger denial-of-service conditions. TheLeaseAPIs can be abused to interfere with time-to-live (TTL) keys and disrupt lease management. - Data Loss and Recovery Issues: An attacker could trigger a
compaction, which permanently removes historical data revisions. This action can break critical workflows that rely on that history, such as watch functions, auditing, and disaster recovery.
Important Note for Kubernetes Users: Standard Kubernetes deployments are NOT affected by this specific flaw. Kubernetes does not use etcd’s built-in authentication; the Kubernetes API server handles all authentication and authorization itself before communicating with etcd.
Remediation and Mitigation
The primary and most effective action is to apply the official patches.
-
Immediate Patching: Upgrade your etcd clusters to the patched versions immediately.
- Upgrade to version 3.4.42, 3.5.28, or 3.6.9, depending on your release branch.
-
If Patching is Delayed: If you cannot upgrade immediately, implement these network-level mitigations:
- Restrict Network Access: Ensure etcd server ports are only accessible by explicitly trusted components (like your Kubernetes API servers). Use strict firewall rules and network policies.
- Enforce Strong Transport Security: Require mutual TLS (mTLS) for all client connections to etcd. Tightly control and scope the distribution of client certificates to prevent unauthorized access.
For organizations assessing their exposure, reviewing recent security news can provide context on similar infrastructure threats, and understanding past incidents via breach reports can highlight the importance of securing foundational services like etcd.
Conclusion
CVE-2026-33413 is a high-risk vulnerability that undermines the security of etcd clusters using its native authentication. Administrators must prioritize patching or implement strict network controls to prevent unauthorized access, operational disruption, and potential data loss.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33413?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. This is due to improper authorization enforcement in the activate...
act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache server listens to connections on all interfaces and allows anyone who can conne...
Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, ...
In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an app to intercept drag-and-drop events due to a missing permission check. This could lead to local escalation of privileg...