Harbor Vulnerability Allows Information Disclosure
Summary
CERT-Bund has issued a security advisory for Harbor, a Docker distribution registry, detailing a vulnerability that allows information disclosure. The advisory affects specific versions of Open Source Harbor and provides mitigation information.
What changed
CERT-Bund has released security advisory WID-SEC-2026-0840 concerning a critical vulnerability in Harbor, a registry that extends Docker Distribution. The vulnerability, with a CVSS Base Score of 6.5, allows an attacker to exploit a flaw to disclose information. Affected versions include Open Source Harbor prior to 2.15.0, 2.14.3, and 2.13.5, and it impacts Linux, UNIX, and Windows operating systems.
Organizations using affected versions of Harbor should apply available mitigations immediately. The advisory indicates that remote attacks are possible. While specific compliance deadlines are not mentioned, prompt patching or updating to a secure version is crucial to prevent potential data breaches and maintain the integrity of artifact management and access control policies.
What to do next
- Update Open Source Harbor to a version greater than or equal to 2.15.0, 2.14.3, or 2.13.5
- Apply available mitigations for the information disclosure vulnerability
Archived snapshot
Mar 25, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0840] Harbor: Schwachstelle ermöglicht Offenlegung von Informationen CVSS Base Score 6.5 (mittel) CVSS Temporal Score 5.7 (mittel) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Harbor ist eine Registry, die die Docker Distribution erweitert, um Artefakte mit Richtlinien und rollenbasierter Zugriffskontrolle zu sichern.
Produkte
24.03.2026
- Open Source Harbor <2.15.0
Open Source Harbor <2.14.3
Open Source Harbor <2.13.5
Angriff
Angriff
Ein Angreifer kann eine Schwachstelle in Harbor ausnutzen, um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.