Cyber Posture

CVE-2026-24762

High

Published: 03 February 2026

Published
03 February 2026
Modified
23 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0005 15.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24762 is a high-severity Insertion of Sensitive Information into Log File (CWE-532) vulnerability in Rustfs Rustfs. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Credentials In Files (T1552.001); ranked at the 15.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Credentials In Files (T1552.001).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-532

Procedures mandate excluding sensitive data from logs to prevent unauthorized exposure via audit records.

addresses: CWE-532

Identifies insertion of sensitive data into logs, allowing detection of unauthorized disclosure.

addresses: CWE-532

Cross-organizational coordination enables agreement on what data to include in audit logs, directly reducing insertion of sensitive information.

addresses: CWE-532

Identifying logging as a data action allows prevention of sensitive information being inserted into log files.

addresses: CWE-532

The process of identifying and eradicating spilled information applies directly to sensitive data inserted into log files.

addresses: CWE-532

Specific processing rules for sensitive PII categories commonly include restrictions on logging, making insertion of such data into log files less likely.

addresses: CWE-532

PIAs detect planned or existing logging of PII and require removal or protection, preventing insertion of sensitive information into logs.

addresses: CWE-532

Limits insertion of sensitive operational details into logs by treating such data as key information requiring protection.

MITRE ATT&CK Enterprise TechniquesAI

T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Plaintext credential logging in application log files directly enables T1552.001 by exposing access/secret keys and tokens in files accessible to attackers with log read permissions.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

RustFS is a distributed object storage system built in Rust. From versions alpha.13 to alpha.81, RustFS logs sensitive credential material (access key, secret key, session token) to application logs at INFO level. This results in credentials being recorded in plaintext…

more

in log output, which may be accessible to internal or external log consumers and could lead to compromise of sensitive credentials. This issue has been patched in version alpha.82.

Deeper analysisAI

CVE-2026-24762 affects RustFS, a distributed object storage system implemented in Rust, specifically versions from alpha.13 to alpha.81 inclusive. The vulnerability involves the logging of sensitive credential material—including access keys, secret keys, and session tokens—at the INFO log level in plaintext within application logs. This exposure, classified under CWE-532 (Insertion of Sensitive Information into Log File), carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting high confidentiality impact with network accessibility and no prerequisites for exploitation.

Attackers can exploit this issue by gaining access to the RustFS application logs, which may be consumed internally by administrators, monitoring systems, or externally via log aggregation services. No special privileges or user interaction are required, allowing any entity with log read permissions—such as compromised internal accounts, misconfigured log shipping, or external log viewers—to extract the plaintext credentials. Successful exploitation enables full compromise of the associated credentials, potentially granting unauthorized access to RustFS storage resources or linked services.

The GitHub Security Advisory at https://github.com/rustfs/rustfs/security/advisories/GHSA-r54g-49rx-98cr details the patch in RustFS version alpha.82, which addresses the logging of sensitive material. Security practitioners should upgrade to alpha.82 or later and review existing logs from affected versions for credential exposure, implementing log access controls and rotation to mitigate risks.

Details

CWE(s)

Affected Products

rustfs
rustfs
1.0.0

CVEs Like This One

CVE-2026-22782Same product: Rustfs Rustfs
CVE-2026-40937Same product: Rustfs Rustfs
CVE-2025-68705Same product: Rustfs Rustfs
CVE-2026-22043Same product: Rustfs Rustfs
CVE-2026-22042Same product: Rustfs Rustfs
CVE-2026-21862Same product: Rustfs Rustfs
CVE-2026-27607Same product: Rustfs Rustfs
CVE-2026-27822Same product: Rustfs Rustfs
CVE-2025-68926Same product: Rustfs Rustfs
CVE-2024-7577Shared CWE-532

References