NATS Server Vulnerabilities Allow Remote Attackers to Disclose/Manipulate Info, Cause DoS
Summary
CERT-Bund has issued a security advisory regarding multiple vulnerabilities in NATS Server versions prior to 2.12.6 and 2.11.15. These vulnerabilities, with a CVSS base score of 8.6, allow remote attackers to disclose or manipulate information, cause denial-of-service, and bypass security mechanisms.
What changed
CERT-Bund has released security advisory WID-SEC-2026-0858 detailing critical vulnerabilities in Open Source NATS Server versions prior to 2.12.6 and 2.11.15. The advisory highlights a CVSS base score of 8.6, indicating a high severity. Remote, anonymous attackers can exploit these flaws to disclose or manipulate information, cause denial-of-service (DoS) conditions, and bypass security controls.
Organizations utilizing affected NATS Server versions, particularly those running on Linux and UNIX operating systems, should prioritize applying the available mitigations. This involves updating to NATS Server version 2.12.6 or later, or 2.11.15 or later, to address these security risks. Failure to do so could lead to significant information breaches, service disruptions, and compromised security posture.
What to do next
- Update Open Source NATS Server to version 2.12.6 or later, or 2.11.15 or later.
- Apply available mitigations for affected NATS Server installations.
Source document (simplified)
[WID-SEC-2026-0858] NATS Server: Mehrere Schwachstellen CVSS Base Score 8.6 (hoch) CVSS Temporal Score 7.5 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
Produktbeschreibung
Der NATS-Server ist ein Server für NATS.io, das Cloud- und Edge-native Messaging-System.
Produkte
24.03.2026
- Open Source NATS Server <2.12.6
- Open Source NATS Server <2.11.15
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in NATS Server ausnutzen, um Informationen offenzulegen oder zu manipulieren, einen Denial-of-Service zu verursachen und Sicherheitsmechanismen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.