- 🚨 **CVE-2026-42072**: NornicDB Bolt Server binds to all interfaces by default. >- Even with config set, **Bolt port** listens on `0.0.0.0`. >- 🔓 Exposes DB & **default admin:password** in LAN.…
- 🛠️ **Root Cause**: Config not passed to Bolt server. >- `--address` & env vars work for HTTP ✅ but NOT for Bolt ❌. >- 🧱 Likely **CWE-400**: Uncontrolled Resource Consumption / Exposure.…
- 🎯 **Affected**: NornicDB versions **< 1.0.42-hotfix**. >- 📦 Component: **Bolt Server** (graph traversal & write API). >- 🖥️ Any OS running vulnerable version in LAN.
Q4黑客能干啥?(权限/数据)
- 🕵️ **Attackers** in LAN can: > - 🔓 Login via **admin/password**. > - 📂 Read/modify **graph & vector data**. > - ⚙️ Execute **write ops & traversals**. >- 💀 **Privilege**: Full control (no auth needed).
Q5利用门槛高吗?(认证/配置)
- 🟢 **Exploitation threshold LOW**. >- 🚪 No auth needed. >- 🌐 Just need LAN access. >- ⚙️ Works even if user tried to restrict binding.
Q6有现成Exp吗?(PoC/在野利用)
- 🔍 **No public PoC** listed. >- `pocs`: empty. >- ❌ Not marked as exploited in wild (per data). >- 📉 But risk still HIGH due to simplicity.
Q7怎么自查?(特征/扫描)
- 🧪 **Self-check steps**: > - Run `netstat -tulnp` or `ss -ltnp`. > - Check if Bolt port (default?) binds to `0.0.0.0`. > - ✅ Confirm version < 1.0.42-hotfix.…