CVE-2026-33343
etcd vulnerability analysis and mitigation

etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, an authenticated user with RBAC restricted permissions on key ranges can use nested transactions to bypass all key-level authorization. This allows any authenticated user with direct access to etcd to effectively ignore all key range restrictions, accessing the entire etcd data store. Kubernetes does not rely on etcd’s built-in authentication and authorization. Instead, the API server handles authentication and authorization itself, so typical Kubernetes deployments are not affected. Versions 3.4.42, 3.5.28, and 3.6.9 contain a patch. If upgrading is not immediately possible, reduce exposure by treating the affected RPCs as unauthenticated in practice. Restrict network access to etcd server ports so only trusted components can connect and require strong client identity at the transport layer, such as mTLS with tightly scoped client certificate distribution.


SourceNVD

Related etcd vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33413HIGH8.8
  • etcdetcd
  • etcd
NoYesMar 26, 2026
CVE-2025-30204HIGH7.5
  • DockerDocker
  • argo-cd-fips-2.12
NoYesMar 21, 2025
CVE-2023-45288HIGH7.5
  • cAdvisorcAdvisor
  • yq
NoYesApr 04, 2024
CVE-2026-33343MEDIUM6.5
  • etcdetcd
  • etcd
NoYesMar 26, 2026
CVE-2024-51744LOW3.1
  • DockerDocker
  • github.com/golang-jwt/jwt/v4
NoYesNov 04, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management