Cyber Posture

CVE-2026-33217

High

Published: 25 March 2026

Published
25 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
EPSS Score 0.0003 9.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33217 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Linuxfoundation Nats-Server. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 9.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires the system to enforce approved authorizations including ACLs on all namespaces such as $MQTT.>, directly addressing the authorization bypass vulnerability.

prevent

Mandates timely flaw remediation through patching to versions 2.11.15 or 2.12.6, eliminating the ACL enforcement failure in NATS-Server.

prevent

Enforces least privilege principles to limit damage from MQTT clients bypassing ACLs in the $MQTT.> namespace.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authorization bypass in public-facing NATS-Server (MQTT namespace ACL evasion) directly enables remote exploitation of the server application (T1190) by low-privileged users to obtain unauthorized elevated access to restricted subjects (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, when using ACLs on message subjects, these ACLs were not applied in the `$MQTT.>` namespace, allowing MQTT clients to bypass…

more

ACL checks for MQTT subjects. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available.

Deeper analysisAI

CVE-2026-33217 is an authorization bypass vulnerability in NATS-Server, the high-performance server implementation for NATS.io, a cloud and edge native messaging system. In versions prior to 2.11.15 and 2.12.6, Access Control Lists (ACLs) defined on message subjects are not enforced within the $MQTT.> namespace. This allows MQTT clients to evade ACL checks that would otherwise restrict access to MQTT subjects. The issue, published on 2026-03-25, is categorized under CWE-863 (Incorrect Authorization) with a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).

The vulnerability can be exploited over the network by low-privileged users (PR:L) with low attack complexity and no user interaction required. An attacker leveraging an MQTT client can bypass ACL protections in the $MQTT.> namespace, enabling unauthorized publishing to or subscription from restricted MQTT subjects. This leads to a low impact on confidentiality but a high impact on integrity, potentially allowing manipulation or exposure of messaging data outside intended authorization boundaries.

NATS-Server versions 2.11.15 and 2.12.6 include fixes for this vulnerability, and upgrading to these releases is the recommended mitigation. No known workarounds exist. Additional details are available in the project advisories at https://advisories.nats.io/CVE/secnote-2026-07.txt and https://github.com/nats-io/nats-server/security/advisories/GHSA-jxxm-27vp-c3m5.

Details

CWE(s)

Affected Products

linuxfoundation
nats-server
≤ 2.11.15 · 2.12.0 — 2.12.6

CVEs Like This One

CVE-2026-27571Same product: Linuxfoundation Nats-Server
CVE-2026-29785Same product: Linuxfoundation Nats-Server
CVE-2026-27889Same product: Linuxfoundation Nats-Server
CVE-2026-33247Same product: Linuxfoundation Nats-Server
CVE-2026-33216Same product: Linuxfoundation Nats-Server
CVE-2026-33218Same product: Linuxfoundation Nats-Server
CVE-2024-53351Same vendor: Linuxfoundation
CVE-2026-32613Same vendor: Linuxfoundation
CVE-2026-32267Shared CWE-863
CVE-2026-42426Shared CWE-863

References