Changeflow GovPing Data Privacy & Cybersecurity Two Critical Unauthenticated RCE Vulnerabilitie...
Urgent Guidance Added Final

Two Critical Unauthenticated RCE Vulnerabilities in Rclone, CVSS 9.2, Patch Immediately

Favicon for ccb.belgium.be Belgium CCB News alt
Published
Detected
Email

Summary

The Centre for Cybersecurity Belgium (CCB) issued a critical security advisory warning of two unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) affecting Rclone versions prior to 1.73.5. Both vulnerabilities carry a CVSS 4.0 score of 9.2 and allow remote attackers to bypass authentication controls or execute arbitrary commands on affected systems without requiring credentials or elevated privileges. The CCB strongly recommends immediate patching and enabling global HTTP authentication on RC server endpoints. As of the cut-off date of 23 April 2026, there is no indication of active exploitation.

“The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.”

CCB , verbatim from source
Published by CCB on ccb.belgium.be . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Belgium CCB News alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 6 changes logged to date.

What changed

The CCB published a critical security advisory identifying two unauthenticated remote code execution vulnerabilities in Rclone, a command-line program used to manage files on cloud storage. CVE-2026-41176 is an authentication bypass on the RC administrative interface, while CVE-2026-41179 is a single-request command-execution vulnerability via the WebDAV backend initialization. Both require the RC API to be enabled and reachable without global HTTP authentication. The CCB recommends patching to version 1.73.5, enabling RC HTTP authentication, and implementing network-level access restrictions.

Organisations running Rclone with the remote control API enabled should treat this as an urgent priority. Any instance serving RC to non-localhost without --rc-user/--rc-pass/--rc-htpasswd authentication is potentially exploitable. Even after patching, organisations should monitor for indicators of historical compromise, as patching does not remediate prior intrusions.

What to do next

  1. Install updates for vulnerable devices with highest priority after thorough testing
  2. Enable global HTTP authentication on RC servers
  3. Implement network-level controls to restrict access to RC server endpoints
  4. Upscale monitoring and detection to identify suspicious activity

Archived snapshot

Apr 24, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Warning: Two critical unauthenticated code execution vulnerabilities in Rclone, Patch Immediately!

Image

Published : 24/04/2026

  • Last update: 24/04/2026
  • Affected software: → Rclone
  • Type: Remote Code Execution
  • CVE/CVSS → CVE-2026-41176: CVSS 9.2 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) → CVE-2026-41179: CVSS 9.2 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)

Sources

Advisory (CVE-2026-41176) - https://github.com/rclone/rclone/security/advisories/GHSA-25qr-6mpr-f7qx
Advisory (CVE-2026-41179) - https://github.com/rclone/rclone/security/advisories/GHSA-jfwf-28xr-xw6q >

Risks

Two critical vulnerabilities have been identified in Rclone. CVE-2026-41176 and CVE-2026-41179 are both unauthenticated code execution vulnerabilities. Either one can be exploited remotely.

Rclone is a command-line program to manage files on cloud storage. It is a popular tool that works with a majority of cloud providers. As more and more organisations rely on the cloud to store data, including sensitive data, vulnerabilities targeting cloud technology become increasingly attractive for threat actors.

As of this publication, there is no indication of active exploitation (cut-off date: 23 April 2026).

Description

CVE-2026-41176 is an authentication bypass vulnerability on the RC (Remote Control) administrative interface of Rclone versions prior to version 1.73.5. An unauthenticated attacker with network access to an Rclone RC server can bypass authentication controls and gain unauthorised access to sensitive administrative functionality, including configuration and operational RC methods.

This could allow attackers to manipulate configuration, access operational RC methods, read sensitive data, and potentially compromise the integrity and confidentiality of stored cloud data and configurations. Depending on the enabled RC surface and runtime configuration, this can lead to local file read, credential/config disclosure, filesystem enumeration, and command execution.

CVE-2026-41179 is a single-request unauthenticated command-execution vulnerability on reachable RC deployments without global HTTP authentication. It affects Rclone versions prior to version 1.73.5. An unauthenticated attacker with network access to an RC deployment can execute arbitrary local commands on the affected system without requiring any authentication or elevated privileges. This is accomplished through a single request by leveraging the WebDAV backend initialization process.

A successful attacker can obtain local file read, file write, or shell access, depending on the deployed environment. This could potentially lead to full system compromise, data theft, lateral movement, or denial of service.

Note for the following preconditions must be met for the exploitation of CVE-2026-41176 and CVE-2026-41179 to be successful:

  • The rclone remote control API must be enabled, either by the --rc flag or by running the rclone rcd server.
  • The remote control API must be reachable by the attacker - by default rclone only serves the rc to localhost unless the --rc-addr flag is in use.
  • The rc must have been deployed without global RC HTTP authentication - so not using --rc-user/--rc-pass/--rc-htpasswd/etc.

Recommended Actions

Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.

The CCB also recommends enabling global HTTP authentication on RC servers and implementing network-level controls to restrict access to RC server endpoints and the RC service.

Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.

While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.

References

Feedly - https://feedly.com/cve/CVE-2026-41176
Feedly - https://feedly.com/cve/CVE-2026-41179

Get daily alerts for Belgium CCB News alt

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CCB.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CCB
Published
April 24th, 2026
Instrument
Guidance
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Government agencies Healthcare providers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability remediation Patch management Secure server configuration
Geographic scope
BE BE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Data Privacy Communications & Technology

Get alerts for this source

We'll email you when Belgium CCB News alt publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!