プラットフォーム
other
コンポーネント
milvus
修正版
2.5.28
2.6.1
CVE-2026-26190 is a critical vulnerability affecting Milvus, an open-source vector database. This flaw allows for authentication bypasses and unauthenticated access to the full REST API, enabling data manipulation and credential management. The vulnerability impacts versions less than or equal to 2.6.0 and versions prior to 2.6.10. A fix is available in version 2.5.27.
The impact of CVE-2026-26190 is substantial. Attackers can exploit this vulnerability to gain complete control over a Milvus instance without authentication. This includes reading, modifying, and deleting data stored within the vector database, as well as potentially accessing and compromising credentials. Given Milvus's use in generative AI applications, this could lead to data breaches, model poisoning, and disruption of AI-powered services. The exposed /expr debug endpoint, with its predictable default authentication token, provides a particularly easy entry point for exploitation. The lack of authentication on the full REST API significantly expands the attack surface.
This vulnerability has been publicly disclosed and assigned a CRITICAL CVSS score. While no active exploitation campaigns have been publicly confirmed as of the publication date, the ease of exploitation and the potential impact make it a high-priority concern. The predictable default authentication token significantly lowers the barrier to entry for attackers. It is listed on CISA KEV, indicating a high probability of exploitation.
Organizations deploying Milvus for generative AI applications, particularly those using default configurations or legacy versions, are at significant risk. Shared hosting environments where multiple users share a Milvus instance are also vulnerable, as an attacker compromising one user's account could potentially gain access to the entire database. Any deployment relying on the default authentication token is immediately exposed.
• linux / server:
journalctl -u milvus -g 'authentication bypass'• generic web:
curl -I http://<milvus_ip>:9091/api/v1/ | grep -i 'authentication'disclosure
エクスプロイト状況
EPSS
0.35% (57% パーセンタイル)
CISA SSVC
CVSS ベクトル
The primary mitigation for CVE-2026-26190 is to upgrade Milvus to version 2.5.27 or later. If an immediate upgrade is not feasible, consider temporarily disabling the /expr debug endpoint. Restrict network access to port 9091, limiting access to only trusted clients. Implement robust authentication mechanisms for the REST API, moving away from the default, predictable token. Review and harden etcd root paths to prevent predictable token generation. After upgrading, verify the fix by attempting to access the REST API without authentication and confirming access is denied.
Actualice Milvus a la versión 2.5.27 o superior, o a la versión 2.6.10 o superior, según corresponda. Esto corrige la vulnerabilidad de acceso no autenticado a la API RESTful en el puerto de métricas (9091).
脆弱性分析と重要アラートをメールでお届けします。
CVE-2026-26190 is a critical vulnerability in Milvus versions ≤ 2.6.0 and < 2.6.10 that allows unauthenticated access to the API and data manipulation due to weak default authentication and exposed ports, earning a CVSS score of 9.8.
You are affected if you are running Milvus versions less than or equal to 2.6.0 or versions prior to 2.6.10. Check your current version and upgrade immediately if vulnerable.
Upgrade Milvus to version 2.5.27 or later. As a temporary workaround, disable the /expr debug endpoint and restrict network access to port 9091.
While no active exploitation campaigns have been publicly confirmed, the ease of exploitation and high impact make it a high-priority concern and a likely target.
Refer to the official Milvus security advisory, which can be found on the Milvus GitHub repository or their official website (check for updates).