CVE-2026-44797: SSRF in Nautobot ≤3.1.1
プラットフォーム
python
コンポーネント
nautobot
修正版
3.1.2
CVE-2026-44797 describes a Server-Side Request Forgery (SSRF) vulnerability within Nautobot's Webhook functionality. This allows users with sufficient access to craft requests to unintended hosts and IP addresses, potentially leading to unauthorized access and data exposure. The vulnerability affects versions of Nautobot up to and including 3.1.1, and patches are available in versions 2.4.33 and 3.1.2.
このCVEがあなたのプロジェクトに影響するか確認
requirements.txt ファイルをアップロードすると、影響の有無を即座にお知らせします。
影響と攻撃シナリオ翻訳中…
The SSRF vulnerability in Nautobot arises from the ability of users to configure Webhooks that can initiate requests to arbitrary destinations. An attacker could leverage this to scan internal networks, access sensitive resources behind firewalls, or even interact with internal services that should not be publicly accessible. This could lead to data exfiltration, privilege escalation, or denial of service. The impact is amplified if the Nautobot instance is deployed in an environment with sensitive internal resources or if it's used to manage critical infrastructure. The ability to bypass access controls and directly interact with internal systems makes this a significant security risk.
悪用の状況翻訳中…
CVE-2026-44797 was published on May 13, 2026. Severity is rated HIGH with a CVSS score of 8.5. There is no indication of this vulnerability being actively exploited in the wild, nor is it currently listed on KEV or EPSS. Public proof-of-concept exploits are not currently available, but the SSRF nature of the vulnerability makes it a potential target for automated scanning and exploitation.
脅威インテリジェンス
エクスプロイト状況
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
- Attack Complexity
- 低 — 特別な条件不要。安定して悪用可能。
- Privileges Required
- 低 — 有効なユーザーアカウントがあれば十分。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化あり — 攻撃が脆弱なコンポーネントを超えて他のシステムに波及可能。
- Confidentiality
- 高 — 機密性の完全喪失。全データが読み取り可能。
- Integrity
- 低 — 限定的な範囲でデータ変更可能。
- Availability
- なし — 可用性への影響なし。
影響を受けるソフトウェア
タイムライン
- 公開日
緩和策と回避策翻訳中…
The primary mitigation for CVE-2026-44797 is to upgrade to Nautobot version 2.4.33 or 3.1.2. These versions include fixes that restrict Webhook requests to HTTP or HTTPS schemes by default. If immediate upgrading is not possible, consider implementing a Web Application Firewall (WAF) or proxy to filter outbound requests from the Nautobot instance, blocking requests to suspicious or unauthorized destinations. Additionally, review existing Webhook configurations to identify and disable any that might be vulnerable. The new settings variables WEBHOOKALLOWEDSCHEMES can be used to further restrict allowed schemes.
修正方法翻訳中…
公式パッチはありません。回避策を確認するか、アップデートを監視してください。
よくある質問翻訳中…
What is CVE-2026-44797 — SSRF in Nautobot?
CVE-2026-44797 is a HIGH severity SSRF vulnerability affecting Nautobot versions up to 3.1.1. It allows attackers to make unauthorized requests through misconfigured Webhooks, potentially accessing internal resources.
Am I affected by CVE-2026-44797 in Nautobot?
If you are running Nautobot version 3.1.1 or earlier, you are potentially affected by this vulnerability. Check your version and upgrade as soon as possible.
How do I fix CVE-2026-44797 in Nautobot?
Upgrade to Nautobot version 2.4.33 or 3.1.2. Configure the WEBHOOKALLOWEDSCHEMES setting to restrict allowed schemes and consider using a WAF as an interim measure.
Is CVE-2026-44797 being actively exploited?
There is currently no public evidence of CVE-2026-44797 being actively exploited, but the SSRF nature of the vulnerability warrants vigilance.
Where can I find the official Nautobot advisory for CVE-2026-44797?
Refer to the official Nautobot security advisories on their website or GitHub repository for the most up-to-date information and guidance regarding CVE-2026-44797.
このCVEがあなたのプロジェクトに影響するか確認
requirements.txt ファイルをアップロードすると、影響の有無を即座にお知らせします。
Pythonプロジェクトを今すぐスキャン — アカウント不要
Upload your requirements.txt and get the vulnerability report instantly. No account. Uploading the file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.
依存関係ファイルをドラッグ&ドロップ
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...