Changeflow GovPing Data Privacy & Cybersecurity etcd Security Advisory: Multiple Vulnerabilities
Priority review Notice Added Final

etcd Security Advisory: Multiple Vulnerabilities

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 22nd, 2026
Detected March 23rd, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in etcd, versions prior to 3.6.9, 3.5.28, and 3.4.42. These vulnerabilities allow attackers to bypass security measures, with a high CVSS base score of 8.6. Affected systems include Linux, UNIX, and Windows.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0818) detailing multiple vulnerabilities in the open-source distributed key-value store, etcd. The advisory highlights that versions prior to 3.6.9, 3.5.28, and 3.4.42 are affected. These vulnerabilities, rated with a high CVSS base score of 8.6, allow remote attackers to bypass security mechanisms. The advisory applies to Linux, UNIX, and Windows operating systems.

Organizations utilizing vulnerable versions of etcd must take immediate action to mitigate risks. This includes upgrading etcd to a patched version (3.6.9, 3.5.28, 3.4.42, or later) or implementing relevant security controls. Failure to address these vulnerabilities could lead to unauthorized access and compromise of critical system data. The advisory provides links for further information and specific CVE details.

What to do next

  1. Upgrade etcd to versions 3.6.9, 3.5.28, 3.4.42, or later.
  2. Implement security controls to mitigate identified vulnerabilities if immediate upgrade is not possible.

Source document (simplified)

[WID-SEC-2026-0818] etcd: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen CVSS Base Score 8.6 (hoch) CVSS Temporal Score 7.5 (hoch) Remoteangriff ja Datum 22.03.2026 Stand 23.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Verteilter zuverlässiger Schlüsselwertspeicher für die wichtigsten Daten eines verteilten Systems

Produkte

22.03.2026
- Open Source etcd <3.6.9

  • Open Source etcd <3.5.28

  • Open Source etcd <3.4.42

Angriff

Angriff

Ein Angreifer kann eine Schwachstellen in etcd ausnutzen, um Sicherheitsvorkehrungen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 22nd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0818

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology 5182 Data Processing & Hosting
Activity scope
Vulnerability Management System Security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Vulnerability Management Data Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.