Impact
A flaw in etcd allows an authenticated user to read data or attach leases through transaction operations that use PrevKv or lease attachment features. Because the authorization checks are bypassed, a user without sufficient read or lease permissions can access or manipulate data they should not be able to reach. The vulnerability represents an authorization bypass and can lead to exposure of sensitive information or improper lease management.
Affected Systems
The issue affects etcd-io:etcd versions prior to 3.4.44, 3.5.30, and 3.6.11. Users running any of those releases without the fix have the flaw exposed. Production clusters that rely on etcd for configuration or data storage and lack the newest supported release are at risk.
Risk and Exploitability
The risk is high because the flaw permits unauthorized data read or lease attachment, effectively elevating privileges within the etcd data store. The EPSS score is not available, indicating no quantifiable data on exploitation probability, and the vulnerability is not listed in CISA KEV. Attackers would need authenticated access to the cluster and would exploit transaction API calls containing PrevKv or lease features, which are commonly used in advanced cluster operations. Given the severity of the bypass and the lack of mitigation in older releases, the overall threat is significant.
OpenCVE Enrichment
Github GHSA