VYPR
Critical severityNVD Advisory· Published Apr 4, 2023· Updated Feb 18, 2025

CVE-2021-28235

CVE-2021-28235

Description

Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An authentication bypass vulnerability in etcd v3.4.10's debug function enables remote privilege escalation without credentials.

Root

Cause The vulnerability resides in the debug function of etcd version 3.4.10, a distributed key-value store widely used with Kubernetes. The debug function fails to enforce proper authentication checks, allowing unauthenticated remote access to a privileged debugging interface. This bypasses the security model that normally requires client certificate authentication or other credentials for administrative operations.

Exploitation

Prerequisites No authentication or network proximity is required; an attacker can exploit this remotely over the network. The debug function is accessible via the exposed API endpoint without any prior valid session or certificate, as the authentication mechanism is not invoked. This makes the attack surface broad, especially in deployments where etcd's API is exposed without additional network segmentation.

Impact

Successful exploitation grants an attacker escalated privileges within the etcd cluster. This can lead to reading, modifying, or deleting all keys in the store, disrupting the operation of Kubernetes and other critical distributed systems that rely on etcd for configuration and state management. An attacker may also pivot to other components by manipulating stored secrets or credentials.

Mitigation

Status Upgrade to a patched version of etcd after 3.4.10. Red Hat has also issued advisories for affected products in their portfolio [1][2]. No workaround is available beyond restricting network access to the etcd API until the patch is applied.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.