⚠ Actively exploited
Added to CISA KEV on 2022-08-25. Federal agencies required to patch by 2022-09-15. Required action: Apply updates per vendor instructions..
CVE-2021-39226 — Improper Authentication in Grafana
Severity
7.3HIGHNVD
CNA9.8VulnCheck9.8
EPSS
94.3%
top 0.04%
CISA KEV
KEV
Added 2022-08-25
Due 2022-09-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 5
KEV addedAug 25
KEV dueSep 15
Latest updateApr 7
CISA Required Action: Apply updates per vendor instructions.
Description
Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regar…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.4
Affected Packages3 packages
Also affects: Fedora 34, 35
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
1Nuclei▶
Grafana Snapshot - Authentication Bypass
🔍Detection Rules
1📋Vendor Advisories
2🕵️Threat Intelligence
1Unit42▶
Network Security Trends: Recent Exploits Observed in the Wild Include Remote Code Execution, Cross-Site Scripting and More↗2022-08-19