Description
An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.
Published: 2026-05-21
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability allows a remote authenticated attacker to read or overwrite any file on the Netatalk server by creating a symbolic link to that file in a location where Netatalk can resolve it. By controlling the symlink creation, the attacker can target sensitive configuration files or other privileged data. The flaw is a classic improper link resolution issue, categorized as CWE-59, and does not provide code execution or denial of service, but the ability to read or modify arbitrary files can lead to compromise of confidential information or system integrity.

Affected Systems

Netatalk versions 3.0.2 through 4.4.2 are affected. The vulnerability is fixed in 4.4.3; all other versions from the same series share the same issue.

Risk and Exploitability

With a CVSS score of 8.1, this flaw is considered high severity. While the EPSS score is not available, the lack of listing in the CISA KEV catalog suggests no widespread exploitation detected yet, but the attack vector is likely over the network via AFP or Samba services. An attacker who can influence the creation of symbolic links in the server’s shared directories—whether through an authenticated session or a local privilege exploitation—can read arbitrary files or overwrite them. The risk is significant for systems that expose sensitive information or rely on strict data isolation.

Generated by OpenCVE AI on May 21, 2026 at 10:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Netatalk to version 4.4.3 or later to eliminate the vulnerability.
  • Restrict file system permissions on the directories served by AFP to prevent unauthorized users from creating symbolic links.
  • Audit shared directories for existing symbolic links and remove any that are unauthorized or point to sensitive files.

Generated by OpenCVE AI on May 21, 2026 at 10:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-62801 netatalk security update
History

Thu, 21 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 May 2026 09:00:00 +0000

Type Values Removed Values Added
Description In Netatalk 3.0.2 through 4.4.2, arbitrary file read via attacker-controlled symlink creation. Fixed in 4.4.3. An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.

Thu, 21 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Netatalk
Netatalk netatalk
Vendors & Products Netatalk
Netatalk netatalk

Thu, 21 May 2026 07:45:00 +0000

Type Values Removed Values Added
Description In Netatalk 3.0.2 through 4.4.2, arbitrary file read via attacker-controlled symlink creation. Fixed in 4.4.3.
Title Arbitrary file read via attacker-controlled symlink creation
Weaknesses CWE-59
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Netatalk Netatalk
cve-icon MITRE

Status: PUBLISHED

Assigner: securin

Published:

Updated: 2026-05-21T12:40:15.466Z

Reserved: 2026-05-05T07:24:42.291Z

Link: CVE-2026-44051

cve-icon Vulnrichment

Updated: 2026-05-21T12:40:11.735Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T08:16:20.690

Modified: 2026-05-21T15:20:19.040

Link: CVE-2026-44051

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T10:30:08Z

Weaknesses