Skip to main content
Mallory

Critical Hardcoded Credential Vulnerability in RustFS Storage Clusters

default-credential-exposurecloud-service-vulnerabilitywidely-deployed-product-advisory
Updated March 21, 2026 at 02:58 PM3 sources
Share:
Critical Hardcoded Credential Vulnerability in RustFS Storage Clusters

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A critical vulnerability, tracked as CVE-2025-68926, was discovered in the RustFS distributed object storage system. The flaw involves the use of a hardcoded static token ("rustfs rpc") for gRPC authentication, which is publicly exposed in the source code and is non-configurable, with no mechanism for token rotation. This token is valid across all RustFS deployments prior to version 1.0.0-alpha.77, allowing any attacker with network access to the gRPC port to authenticate and perform privileged operations such as data destruction, policy manipulation, and cluster configuration changes. The issue has been addressed in version 1.0.0-alpha.77, which removes the hardcoded credential and implements proper authentication controls.

Security researchers have rated this vulnerability as critical, assigning it a CVSS score of 9.8 due to the ease of exploitation and the potential impact on data integrity and availability. Organizations using affected versions of RustFS are strongly advised to upgrade to the patched release immediately to mitigate the risk of unauthorized access and potential compromise of storage clusters. No evidence of exploitation in the wild has been reported as of the latest advisories, but the public nature of the token significantly increases the risk of opportunistic attacks.

Timeline

  1. Jan 4, 2026

    Nuclei template pull request adds detection for CVE-2025-68926

    A ProjectDiscovery nuclei-templates pull request was opened to add detection coverage for CVE-2025-68926. The submission noted the issue was verified against RustFS 1.0.0-alpha.76 and referenced GitHub Security Advisory GHSA-h956-rh7x-ppgj.

  2. Dec 30, 2025

    CVE-2025-68926 disclosed as critical RustFS auth bypass

    CVE-2025-68926 was publicly disclosed as a critical vulnerability affecting RustFS versions before 1.0.0-alpha.77. The flaw stems from a hardcoded static gRPC token ('rustfs rpc') that allows remote attackers with network access to bypass authentication and perform privileged operations.

  3. Dec 30, 2025

    RustFS releases fix in version 1.0.0-alpha.77

    RustFS fixed a critical authentication bypass issue in version 1.0.0-alpha.77 by removing the hardcoded gRPC token from both client and server components. Users were advised to upgrade to this version or later to mitigate the risk.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

January 4, 2026 at 11:57 PM
December 30, 2025 at 05:15 PM

Related Stories

Hardcoded Secrets Enable Authentication Bypass in Open-Source Infrastructure (RustFS and Open5GS WebUI)

Hardcoded Secrets Enable Authentication Bypass in Open-Source Infrastructure (RustFS and Open5GS WebUI)

Two critical hardcoded-secret weaknesses were disclosed in widely used open-source infrastructure components, enabling attackers to bypass authentication and obtain administrative control when exposed or left at insecure defaults. In **RustFS** (an object storage platform often used for backups, logs, and operational data), **CVE-2025-68926** (CVSS 9.8) stems from a *non-rotatable static authentication token* embedded in source code on both client and server sides; an attacker with access to the exposed **gRPC management port** can use the known token to bypass authentication and gain admin access, creating risk of data integrity loss and service disruption. In **Open5GS** (an open-source 5G core implementation), **CVE-2026-0622** affects the optional *WebUI* management interface and arises from default **hardcoded cryptographic secrets** used for **JWT signing**. If operators do not change the default environment variables (reportedly set to `change-me`), an attacker can forge valid JWTs, impersonate an administrator, and gain full WebUI privileges—potentially including configuration and subscriber-data management—while also bypassing controls that rely on authenticated context (e.g., CSRF protections).

1 months ago
Rclone RC Flaws Enable Unauthenticated Auth Bypass and Command Execution

Rclone RC Flaws Enable Unauthenticated Auth Bypass and Command Execution

Two high-severity vulnerabilities in **Rclone** expose its remote control (RC) interface to unauthenticated abuse on deployments that do not enforce global HTTP authentication. **`CVE-2026-41176`** affects versions from `1.45.0` through before `1.73.5` and allows attackers to call the `options/set` endpoint to set `rc.NoAuth=true`, disabling authorization checks for many RC methods and opening access to sensitive administrative, configuration, and operational functions. A second flaw, **`CVE-2026-41179`**, affects versions from `1.48.0` through before `1.73.5` and stems from the `operations/fsinfo` endpoint not requiring authentication while accepting attacker-controlled `fs` input. Because Rclone can instantiate inline backend definitions through `rc.GetFs(...)`, an attacker can create a malicious backend on demand; in the **WebDAV** backend, the `bearer_token_command` option is executed during initialization, enabling single-request unauthenticated local command execution. Both issues were patched in **Rclone `1.73.5`** and were classified under **CWE-306**, with `CVE-2026-41179` also mapped to **CWE-78**.

1 weeks ago
rust-openssl Flaws Enable Memory Disclosure and Buffer Overwrite

rust-openssl Flaws Enable Memory Disclosure and Buffer Overwrite

Two high-severity vulnerabilities were disclosed in **rust-openssl**, the Rust bindings for OpenSSL, affecting multiple `0.9.x` and `0.10.x` releases prior to **`0.10.78`**. **`CVE-2026-41898`** affects versions from `0.9.24` up to, but not including, `0.10.78`, where several FFI trampoline callback paths passed a closure-returned `usize` to OpenSSL without validating it against the output buffer size. The flaw can trigger buffer overflows and leak adjacent memory to a network peer, and it is mapped to **`CWE-126`** and **`CWE-130`**. A second issue, **`CVE-2026-41681`**, affects versions from `0.10.39` up to, but not including, `0.10.78`, in `MdCtxRef::digest_final()`, which writes `EVP_MD_CTX_size(ctx)` bytes to the caller buffer without checking whether the buffer is large enough. The resulting out-of-bounds write can cause stack corruption and is reachable from safe Rust, with the weakness classified as **`CWE-121`**. Both vulnerabilities were addressed in **`rust-openssl 0.10.78`**, with public advisories, code references, and fix details released alongside the CVE records.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.