Changeflow GovPing Data Privacy & Cybersecurity NATS Server Vulnerabilities Allow Remote Attack...
Priority review Notice Amended Final

NATS Server Vulnerabilities Allow Remote Attackers to Disclose/Manipulate Info, Cause DoS

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 24th, 2026
Detected March 25th, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in NATS Server versions prior to 2.12.6 and 2.11.15. These vulnerabilities, with a CVSS base score of 8.6, allow remote attackers to disclose or manipulate information, cause denial-of-service, and bypass security mechanisms.

What changed

CERT-Bund has released security advisory WID-SEC-2026-0858 detailing critical vulnerabilities in Open Source NATS Server versions prior to 2.12.6 and 2.11.15. The advisory highlights a CVSS base score of 8.6, indicating a high severity. Remote, anonymous attackers can exploit these flaws to disclose or manipulate information, cause denial-of-service (DoS) conditions, and bypass security controls.

Organizations utilizing affected NATS Server versions, particularly those running on Linux and UNIX operating systems, should prioritize applying the available mitigations. This involves updating to NATS Server version 2.12.6 or later, or 2.11.15 or later, to address these security risks. Failure to do so could lead to significant information breaches, service disruptions, and compromised security posture.

What to do next

  1. Update Open Source NATS Server to version 2.12.6 or later, or 2.11.15 or later.
  2. Apply available mitigations for affected NATS Server installations.

Source document (simplified)

[WID-SEC-2026-0858] NATS Server: Mehrere Schwachstellen CVSS Base Score 8.6 (hoch) CVSS Temporal Score 7.5 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX

Produktbeschreibung

Der NATS-Server ist ein Server für NATS.io, das Cloud- und Edge-native Messaging-System.

Produkte

24.03.2026
- Open Source NATS Server <2.12.6

  • Open Source NATS Server <2.11.15

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in NATS Server ausnutzen, um Informationen offenzulegen oder zu manipulieren, einen Denial-of-Service zu verursachen und Sicherheitsmechanismen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 24th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0858

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Messaging Systems Vulnerability Management
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Information Disclosure Denial of Service Vulnerability Management

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.