Skip to main content
Mallory

Hard-Coded Credentials Flaw in GoHarbor Harbor Triggers Patch Warning

default-credential-exposurewidely-deployed-product-advisoryidentity-authentication-vulnerability
Updated March 25, 2026 at 05:03 PM2 sources
Share:
Hard-Coded Credentials Flaw in GoHarbor Harbor Triggers Patch Warning

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

CERT/CC published advisory VU#577436 for a hard-coded credentials vulnerability in GoHarbor Harbor, identifying a security flaw that could expose deployments using the container registry platform. The issue was classified as a vulnerability in Harbor itself, with the advisory highlighting the presence of embedded credentials that could undermine authentication controls and increase the risk of unauthorized access.

Belgium's Center for Cybersecurity (CCB) later issued a public warning describing the GoHarbor Harbor issue as critical and urging organizations to patch immediately. The alert signals elevated concern for enterprises that rely on Harbor to store and manage container images, as unremediated systems could be at risk if attackers are able to leverage the hard-coded credentials vulnerability.

Timeline

  1. Mar 25, 2026

    Belgium CCB warns of critical Harbor vulnerability and urges immediate patching

    The Centre for Cybersecurity Belgium issued an advisory warning about a critical vulnerability in GoHarbor Harbor and told organizations to patch immediately. This reflects official follow-on guidance and response activity around the disclosed flaw.

  2. Dec 16, 2025

    CERT/CC publishes VU#577436 for Harbor hard-coded credentials flaw

    CERT/CC published vulnerability note VU#577436 describing a hard-coded credentials vulnerability affecting GoHarbor's Harbor product. This marks the public disclosure of the issue in the provided references.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Organizations

Affected Products

Sources

December 16, 2025 at 12:00 AM

Related Stories

High-Severity Flaws Expose Harbor to Default-Password Access and N2WS to RCE

High-Severity Flaws Expose Harbor to Default-Password Access and N2WS to RCE

Two high-severity vulnerabilities were disclosed affecting widely used infrastructure software. **GoHarbor Harbor** is affected by `CVE-2026-4404`, a hard-coded/default credential issue in version `2.15.0` and below that can let attackers authenticate to the Harbor web UI with the default administrator password if it was never changed. The published scoring indicates the flaw is network-accessible, requires no privileges or user interaction, and can lead to high confidentiality and integrity impact. **N2WS Backup & Recovery** is affected by `CVE-2025-32991`, which impacts versions before `4.4.0` and can lead to remote code execution through a two-step attack against the product’s RESTful API. The CVSS v3.1 vector rates the issue as remotely exploitable with no required privileges or user interaction, despite high attack complexity, and assigns high impact across confidentiality, integrity, and availability. The CVE entry was updated with links to an N2WS security advisory and vendor resources.

1 months ago
Critical Authentication Bypass in Hirschmann HiOS and HiSecOS Grants Admin Access

Critical Authentication Bypass in Hirschmann HiOS and HiSecOS Grants Admin Access

Hirschmann disclosed a critical vulnerability, tracked as **`CVE-2018-25236`**, in the HTTP(S) management module of multiple **HiOS** and **HiSecOS** product lines, including **RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, and EAGLE**. The flaw allows an unauthenticated remote attacker to send specially crafted HTTP requests and gain administrative access to affected devices without valid credentials. The issue stems from improper authentication handling that can cause a new request to inherit the authentication state and privileges of a previously authenticated user. Belgium's Centre for Cybersecurity (CCB) issued a warning describing the bug as critical and urged organizations using affected Hirschmann industrial networking products to patch immediately to prevent unauthorized takeover of device management interfaces.

4 weeks ago
Mass Exposure of Live Credentials in Public Docker Hub Images

Mass Exposure of Live Credentials in Public Docker Hub Images

Security researchers at Flare have discovered that over 10,000 public Docker Hub container images are leaking sensitive secrets, including live credentials for production systems, cloud services, CI/CD pipelines, and AI platforms. The exposed data affects more than 100 organizations, ranging from small businesses to a Fortune 500 company and a major national bank. Many of these secrets are not placeholders but active credentials, with nearly 4,000 API keys for large language models such as OpenAI, HuggingFace, Anthropic, Gemini, and Groq found in the wild. In some cases, a single image contained five or more exposed secrets, significantly increasing the risk of unauthorized access to critical infrastructure. The leaks are often the result of developers inadvertently including sensitive files and hard-coded keys in Docker images, which are then published to public repositories. A notable portion of the exposed secrets comes from "shadow IT" accounts—personal or team Docker Hub registries outside formal corporate oversight—making them difficult for organizations to monitor and secure. The majority of affected organizations are in the software development sector, but the exposure also impacts finance, banking, and AI companies. This incident highlights the urgent need for improved security hygiene and automated scanning in the container development lifecycle to prevent inadvertent credential leaks.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.