Cyber Posture

CVE-2026-21862

High

Published: 03 February 2026

Published
03 February 2026
Modified
23 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0004 13.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21862 is a high-severity Authentication Bypass by Spoofing (CWE-290) vulnerability in Rustfs Rustfs. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-290

Reveals spoofed logon attempts through unexpected previous logon timestamps upon legitimate login.

addresses: CWE-290

Training specifically addresses recognizing spoofed communications and phishing that enable authentication bypass.

addresses: CWE-290

Requiring verifiable identity evidence at appropriate assurance levels makes it substantially harder for attackers to successfully spoof or impersonate users to obtain accounts.

addresses: CWE-290

Unique device authentication makes successful spoofing of device identity substantially more difficult to achieve.

addresses: CWE-290

Unique identification of non-organizational users reduces the feasibility of authentication bypass by spoofing.

addresses: CWE-290

Unique identification and authentication of services before communications makes spoofing of service identities substantially harder.

addresses: CWE-290

Isolated trusted path ensures the user interacts only with genuine system components, preventing spoofing of authentication interfaces or prompts.

addresses: CWE-290

Directly counters DNS response spoofing by requiring cryptographic origin authentication artifacts from the authoritative source.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability directly enables remote exploitation of a public-facing object storage service to bypass IP-based access controls via header spoofing.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

RustFS is a distributed object storage system built in Rust. Prior to version alpha.78, IP-based access control can be bypassed: get_condition_values trusts client-supplied X-Forwarded-For/X-Real-Ip without verifying a trusted proxy, so any reachable client can spoof aws:SourceIp and satisfy IP-allowlist policies.…

more

This issue has been patched in version alpha.78.

Deeper analysisAI

CVE-2026-21862 affects RustFS, a distributed object storage system built in Rust. Prior to version alpha.78, the vulnerability enables bypass of IP-based access control in the get_condition_values function, which trusts client-supplied X-Forwarded-For or X-Real-Ip headers without verifying a trusted proxy. This allows attackers to spoof the aws:SourceIp condition and satisfy IP-allowlist policies. The issue is rated 7.5 on the CVSS 3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and is associated with CWE-290.

Any network-reachable client can exploit this vulnerability without authentication or user interaction. By supplying forged X-Forwarded-For or X-Real-Ip headers, attackers can impersonate an allowed IP address, bypassing IP restrictions on object storage access. This results in high integrity impact, potentially enabling unauthorized data modification or policy evasion, though it does not compromise confidentiality or availability.

The GitHub Security Advisory at https://github.com/rustfs/rustfs/security/advisories/GHSA-fc6g-2gcp-2qrq details the patch in RustFS version alpha.78, which addresses the trust issue in header processing. Security practitioners should upgrade to alpha.78 or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

rustfs
rustfs
1.0.0

CVEs Like This One

CVE-2026-40937Same product: Rustfs Rustfs
CVE-2025-68705Same product: Rustfs Rustfs
CVE-2026-22782Same product: Rustfs Rustfs
CVE-2026-22043Same product: Rustfs Rustfs
CVE-2026-22042Same product: Rustfs Rustfs
CVE-2025-68926Same product: Rustfs Rustfs
CVE-2026-27607Same product: Rustfs Rustfs
CVE-2026-27822Same product: Rustfs Rustfs
CVE-2026-24762Same product: Rustfs Rustfs
CVE-2026-33661Shared CWE-290

References