Description
A vulnerability in Apache IoTDB.

This issue affects Apache IoTDB: from 1.0.0 before 1.3.7, from 2.0.0 before 2.0.7.

Users are recommended to upgrade to version 1.3.7 or 2.0.7, which fixes the issue.
Published: 2026-03-09
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated or unauthorized access through insecure default settings
Action: Patch Now
AI Analysis

Impact

Apache IoTDB releases prior to 1.3.7 and 2.0.7 contain insecure default configuration that may allow an attacker to connect to the database service without proper authentication or to modify configuration values. The associated CWE‑1327 indicates that input or service parameters are not adequately validated, which can lead to unauthorized configuration changes. The CVSS score of 9.8 reflects the potential for severe disruption, including loss of confidentiality, integrity, or availability, if the insecure defaults are abused.

Affected Systems

All Apache IoTDB 1.x releases before 1.3.7 and all 2.x releases before 2.0.7 are affected. Organizations should verify the installed component version and determine whether it falls within the vulnerable range.

Risk and Exploitability

The EPSS score of less than 1 % indicates that the vulnerability is not frequently exploited in the wild and it is not currently listed in CISA’s KEV catalog. Nevertheless, the high severity and the nature of the flaw mean that an attacker who can reach the IoTDB service over the network could potentially bypass authentication or alter configuration settings, using the default credentials or unprotected ports. No documented workaround exists, so the only effective mitigation is to apply the vendor’s patch or to eliminate the insecure defaults as a temporary measure.

Generated by OpenCVE AI on April 18, 2026 at 09:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache IoTDB to at least version 1.3.7 if running a 1.x series or 2.0.7 if running a 2.x series.
  • If a patch cannot be applied immediately, review and modify the default configuration on the deployed instance to disable unauthenticated access, remove default accounts, and close unused ports.
  • Restrict network exposure to the IoTDB service by placing it behind appropriate firewalls, VPNs, or access controls so that only trusted administrators can reach the database.

Generated by OpenCVE AI on April 18, 2026 at 09:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-74cf-pgh9-m5q2 Apache IoTDB has an Insecure Default Configuration Vulnerability
History

Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:apache:iotdb:*:*:*:*:*:*:*:*

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache iotdb
Vendors & Products Apache
Apache iotdb

Mon, 09 Mar 2026 10:30:00 +0000

Type Values Removed Values Added
References

Mon, 09 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in Apache IoTDB. This issue affects Apache IoTDB: from 1.0.0 before 1.3.7, from 2.0.0 before 2.0.7. Users are recommended to upgrade to version 1.3.7 or 2.0.7, which fixes the issue.
Title Apache IoTDB: Insecure Default Configuration Vulnerability
Weaknesses CWE-1327
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-03-10T17:58:18.381Z

Reserved: 2026-01-20T03:23:00.407Z

Link: CVE-2026-24015

cve-icon Vulnrichment

Updated: 2026-03-09T09:19:55.308Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T09:16:02.757

Modified: 2026-03-10T18:56:56.850

Link: CVE-2026-24015

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T09:45:25Z