CVE-2021-28235
Description
Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authentication bypass vulnerability in etcd v3.4.10's debug function enables remote privilege escalation without credentials.
Root
Cause The vulnerability resides in the debug function of etcd version 3.4.10, a distributed key-value store widely used with Kubernetes. The debug function fails to enforce proper authentication checks, allowing unauthenticated remote access to a privileged debugging interface. This bypasses the security model that normally requires client certificate authentication or other credentials for administrative operations.
Exploitation
Prerequisites No authentication or network proximity is required; an attacker can exploit this remotely over the network. The debug function is accessible via the exposed API endpoint without any prior valid session or certificate, as the authentication mechanism is not invoked. This makes the attack surface broad, especially in deployments where etcd's API is exposed without additional network segmentation.
Impact
Successful exploitation grants an attacker escalated privileges within the etcd cluster. This can lead to reading, modifying, or deleting all keys in the store, disrupting the operation of Kubernetes and other critical distributed systems that rely on etcd for configuration and state management. An attacker may also pivot to other components by manipulating stored secrets or credentials.
Mitigation
Status Upgrade to a patched version of etcd after 3.4.10. Red Hat has also issued advisories for affected products in their portfolio [1][2]. No workaround is available beyond restricting network access to the etcd API until the patch is applied.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
10- Etcd-io/Etcd-iodescription
- osv-coords9 versionspkg:bitnami/etcdpkg:golang/go.etcd.io/etcd/v3pkg:rpm/opensuse/etcd&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/etcd&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/etcd&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/etcd-for-k8s1.25&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/etcd-for-k8s1.26&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/etcd-for-k8s1.27&distro=openSUSE%20Tumbleweedpkg:rpm/suse/etcd&distro=SUSE%20Package%20Hub%2015%20SP6
>= 3.4.10, < 3.4.11+ 8 more
- (no CPE)range: >= 3.4.10, < 3.4.11
- (no CPE)
- (no CPE)range: < 3.5.12-150000.7.6.1
- (no CPE)range: < 3.5.12-150000.7.6.1
- (no CPE)range: < 3.5.8-1.1
- (no CPE)range: < 3.5.9-1.1
- (no CPE)range: < 3.5.9-1.1
- (no CPE)range: < 3.5.9-1.1
- (no CPE)range: < 3.5.12-bp156.4.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.