High (8.8)

Etcd authentication bypass (CVE-2026-33413)

CVE-2026-33413

etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call c...

Affected: Etcd Etcd Etcd Etcd Etcd Etcd

Overview

A significant security vulnerability, tracked as CVE-2026-33413, has been identified in etcd, a critical distributed key-value store used by many systems, including Kubernetes. This flaw is an authentication bypass that affects clusters with etcd’s built-in authentication enabled. Unauthorized users can exploit it to perform unauthorized actions without proper credentials.

Vulnerability Details

In affected versions (prior to 3.4.42, 3.5.28, and 3.6.9), the vulnerability exists in the gRPC API. When this API is exposed to untrusted or partially trusted clients, attackers can bypass authentication and authorization checks to call specific etcd functions. This bypass occurs even when etcd’s own “auth” feature is turned on.

Potential Impact

The impact of successful exploitation is severe and can lead to:

  • Information Disclosure: Attackers can call the MemberList function to learn the internal topology of the cluster, including member IDs and network endpoints.
  • Operational Disruption: By calling the Alarm function, an attacker can trigger denial-of-service conditions. The Lease APIs can be abused to interfere with time-to-live (TTL) keys and disrupt lease management.
  • Data Loss and Recovery Issues: An attacker could trigger a compaction, which permanently removes historical data revisions. This action can break critical workflows that rely on that history, such as watch functions, auditing, and disaster recovery.

Important Note for Kubernetes Users: Standard Kubernetes deployments are NOT affected by this specific flaw. Kubernetes does not use etcd’s built-in authentication; the Kubernetes API server handles all authentication and authorization itself before communicating with etcd.

Remediation and Mitigation

The primary and most effective action is to apply the official patches.

  1. Immediate Patching: Upgrade your etcd clusters to the patched versions immediately.

    • Upgrade to version 3.4.42, 3.5.28, or 3.6.9, depending on your release branch.
  2. If Patching is Delayed: If you cannot upgrade immediately, implement these network-level mitigations:

    • Restrict Network Access: Ensure etcd server ports are only accessible by explicitly trusted components (like your Kubernetes API servers). Use strict firewall rules and network policies.
    • Enforce Strong Transport Security: Require mutual TLS (mTLS) for all client connections to etcd. Tightly control and scope the distribution of client certificates to prevent unauthorized access.

For organizations assessing their exposure, reviewing recent security news can provide context on similar infrastructure threats, and understanding past incidents via breach reports can highlight the importance of securing foundational services like etcd.

Conclusion

CVE-2026-33413 is a high-risk vulnerability that undermines the security of etcd clusters using its native authentication. Administrators must prioritize patching or implement strict network controls to prevent unauthorized access, operational disruption, and potential data loss.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-33413?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.