MEDIUMCVE-2026-44794CVSS 5.4

CVE-2026-44794: Authorization Bypass in Nautobot

平台

python

组件

nautobot

修复版本

3.1.2

正在翻译为您的语言…

CVE-2026-44794 describes an authorization bypass vulnerability in Nautobot versions up to 3.1.1. This flaw allows unauthorized access to data through improper handling of inter-object references using GenericForeignKey. Successful exploitation could lead to data breaches and compromise network automation workflows. The vulnerability was published on May 13, 2026, and a fix is available in version 3.1.2.

Python

检测此 CVE 是否影响你的项目

上传你的 requirements.txt 文件,立即知道是否受影响。

上传 requirements.txt支持的格式: requirements.txt · Pipfile.lock

影响与攻击场景翻译中…

The vulnerability stems from Nautobot's REST API failing to enforce user view permissions when validating references within GenericForeignKey relationships. An attacker with permission to create or update objects containing these references, but lacking permission to view the referenced objects, can bypass access controls. For instance, a user who can modify ImageAttachment records but lacks permission to view Device records could potentially access sensitive device information. This could expose confidential network configurations, credentials, or other sensitive data. The blast radius extends to any data accessible through these improperly validated references, potentially impacting multiple modules and workflows within Nautobot.

利用背景翻译中…

The vulnerability's public disclosure date is May 13, 2026. Its severity is rated as medium (CVSS 5.4). There is no indication of this vulnerability being actively exploited in the wild or appearing on KEV/EPSS at the time of writing. Public proof-of-concept exploits are not currently available, but the nature of the authorization bypass makes it likely that such exploits will emerge.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N5.4MEDIUMAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredLow攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityLow敏感数据泄露风险IntegrityLow数据未授权篡改风险AvailabilityNone服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
低 — 任何有效用户账户均可。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
低 — 可访问部分数据。
Integrity
低 — 攻击者可修改部分数据,影响有限。
Availability
无 — 无可用性影响。

受影响的软件

组件nautobot
供应商osv
最高版本3.1.1
修复版本3.1.2

时间线

  1. 发布日期

缓解措施和替代方案翻译中…

The primary mitigation is to upgrade to Nautobot version 3.1.2 or later, which includes the fix for this authorization bypass. If upgrading immediately is not feasible, consider implementing stricter access control policies within Nautobot to limit the permissions granted to users who create or update objects with GenericForeignKey references. Review and restrict access to sensitive objects referenced by these relationships. While a WAF or proxy cannot directly address this vulnerability, they can be configured to monitor for suspicious API requests related to object creation and updates, potentially detecting exploitation attempts. After upgrading, confirm the fix by attempting to access a protected object through a user account lacking the necessary view permissions; access should be denied.

修复方法翻译中…

暂无官方补丁。请查找临时解决方案或持续关注更新。

常见问题翻译中…

What is CVE-2026-44794 — Authorization Bypass in Nautobot?

CVE-2026-44794 is a medium severity vulnerability in Nautobot versions up to 3.1.1 that allows unauthorized access to data through improper handling of object references. Attackers can bypass access controls and potentially view sensitive information.

Am I affected by CVE-2026-44794 in Nautobot?

If you are running Nautobot versions 3.1.1 or earlier, you are potentially affected. Assess your usage of GenericForeignKey relationships to determine the scope of the risk.

How do I fix CVE-2026-44794 in Nautobot?

Upgrade to Nautobot version 3.1.2 or later to resolve the vulnerability. Review and tighten access control policies as an interim measure.

Is CVE-2026-44794 being actively exploited?

There is currently no evidence of active exploitation in the wild, but the vulnerability's nature suggests potential for future exploitation.

Where can I find the official Nautobot advisory for CVE-2026-44794?

Refer to the official Nautobot security advisories on their website or GitHub repository for the latest information and updates regarding CVE-2026-44794.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

Python

检测此 CVE 是否影响你的项目

上传你的 requirements.txt 文件,立即知道是否受影响。

上传 requirements.txt支持的格式: requirements.txt · Pipfile.lock
live免费扫描

立即扫描您的Python项目 — 无需账户

Upload your requirements.txt and get the vulnerability report instantly. No account. Uploading the file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.

手动扫描Slack/邮件提醒持续监控白标报告

拖放您的依赖文件

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...