CVE-2026-22782
high-risk
Published 2026-01-16
RustFS is a distributed object storage system built in Rust. From >= 1.0.0-alpha.1 to 1.0.0-alpha.79, invalid RPC signatures cause the server to log the shared HMAC secret (and expected signature), which exposes the secret to log readers and enables forged RPC calls. In crates/ecstore/src/rpc/http_auth.rs, the invalid signature branch logs sensitive data. This log line includes secret and expected_signature, both derived from the shared HMAC key. Any invalidly signed request triggers this path. The function is reachable from RPC and admin request handlers. This vulnerability is fixed in 1.0.0-alpha.80.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Affected Vendors
54
/ 100
high-risk
Severity
26/34 · High
Exploitability
0/34 · Minimal
Exposure
28/34 · Critical