Description
Netmaker makes networks with WireGuard. Prior to version 1.2.0, the /api/server/shutdown endpoint allows termination of the Netmaker server process via syscall.SIGINT. This allows any user to repeatedly shut down the server, causing cyclic denial of service with approximately 3-second restart intervals. This issue has been patched in version 1.2.0.
Published: 2026-03-07
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

Netmaker, a platform that creates networks using WireGuard, contained a flaw that enabled any user to terminate the server by calling /api/server/shutdown. The endpoint triggered a SIGINT signal, causing the Netmaker server process to exit and automatically restart after a brief delay, inducing repeated downtime. The consequence is a denial of service that can be executed continually, disrupting network availability for all clients. The weakness is classified as a missing resource error (CWE‑404).

Affected Systems

Affected systems are installations of gravitl Netmaker older than version 1.2.0. The vulnerability applies to all releases before the 1.2.0 patch, which was released to fix the shutdown endpoint behavior. All environments running those earlier builds are susceptible when the /api/server/shutdown endpoint is reachable.

Risk and Exploitability

The CVSS score of 8.7 indicates a high impact vulnerability. The EPSS score is below 1 %, suggesting a low probability of exploitation at this time, and the issue is not listed in the KEV catalog. The likely attack vector is remote HTTP(S) requests to the shutdown endpoint; the description states that any user can trigger the flaw, so authentication, if present, may not be sufficient. An attacker who can reach the endpoint can repeatedly restart the server, leading to predictable 3‑second restart cycles that cause noticeable traffic disruption. However, the tool’s default configuration may limit endpoint exposure, so the practical risk depends on the network visibility of the API.

Generated by OpenCVE AI on April 16, 2026 at 10:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all Netmaker installations to version 1.2.0 or later.
  • Seal the /api/server/shutdown endpoint behind authentication or firewall rules to prevent unauthorized access if an upgrade is delayed.
  • Monitor system logs for recurrent shutdown signals and verify that the server is not restarting unexpectedly.

Generated by OpenCVE AI on April 16, 2026 at 10:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rhr9-hgcm-x289 Netmaker Vulnerable to Denial of Service via Server Shutdown Endpoint
History

Thu, 12 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gravitl:netmaker:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Gravitl
Gravitl netmaker
Vendors & Products Gravitl
Gravitl netmaker

Sat, 07 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Description Netmaker makes networks with WireGuard. Prior to version 1.2.0, the /api/server/shutdown endpoint allows termination of the Netmaker server process via syscall.SIGINT. This allows any user to repeatedly shut down the server, causing cyclic denial of service with approximately 3-second restart intervals. This issue has been patched in version 1.2.0.
Title Netmaker: Denial of Service via Server Shutdown Endpoint
Weaknesses CWE-404
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Gravitl Netmaker
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T18:27:17.865Z

Reserved: 2026-03-04T16:26:02.897Z

Link: CVE-2026-29771

cve-icon Vulnrichment

Updated: 2026-03-09T17:43:40.430Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T16:15:54.657

Modified: 2026-03-12T13:58:38.540

Link: CVE-2026-29771

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses