Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-42072 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

- 🚨 **CVE-2026-42072**: NornicDB Bolt Server binds to all interfaces by default. >- Even with config set, **Bolt port** listens on `0.0.0.0`. >- πŸ”“ Exposes DB & **default admin:password** in LAN.…

Q2Root Cause? (CWE/Flaw)

- πŸ› οΈ **Root Cause**: Config not passed to Bolt server. >- `--address` & env vars work for HTTP βœ… but NOT for Bolt ❌. >- 🧱 Likely **CWE-400**: Uncontrolled Resource Consumption / Exposure.…

Q3Who is affected? (Versions/Components)

- 🎯 **Affected**: NornicDB versions **< 1.0.42-hotfix**. >- πŸ“¦ Component: **Bolt Server** (graph traversal & write API). >- πŸ–₯️ Any OS running vulnerable version in LAN.

Q4What can hackers do? (Privileges/Data)

- πŸ•΅οΈ **Attackers** in LAN can: > - πŸ”“ Login via **admin/password**. > - πŸ“‚ Read/modify **graph & vector data**. > - βš™οΈ Execute **write ops & traversals**. >- πŸ’€ **Privilege**: Full control (no auth needed).

Q5Is exploitation threshold high? (Auth/Config)

- 🟒 **Exploitation threshold LOW**. >- πŸšͺ No auth needed. >- 🌐 Just need LAN access. >- βš™οΈ Works even if user tried to restrict binding.

Q6Is there a public Exp? (PoC/Wild Exploitation)

- πŸ” **No public PoC** listed. >- `pocs`: empty. >- ❌ Not marked as exploited in wild (per data). >- πŸ“‰ But risk still HIGH due to simplicity.

Q7How to self-check? (Features/Scanning)

- πŸ§ͺ **Self-check steps**: > - Run `netstat -tulnp` or `ss -ltnp`. > - Check if Bolt port (default?) binds to `0.0.0.0`. > - βœ… Confirm version < 1.0.42-hotfix.…

Q8Is it fixed officially? (Patch/Mitigation)

- βœ… **Fixed in v1.0.42-hotfix**. >- πŸ”§ Commit: `adce4f9a`. >- πŸ“’ Advisory: [GHSA-2hp7-65r3-wv54](https://github.com/orneryd/NornicDB/security/advisories/GHSA-2hp7-65r3-wv54).…

Q9What if no patch? (Workaround)

- 🚧 **If no patch**: > - πŸ”₯ Block Bolt port via firewall (LAN-level). > - 🚫 Disable Bolt if unused. > - πŸ” Change default `admin` password ASAP (if accessible). > - πŸ—οΈ Isolate NornicDB host in private VLAN.

Q10Is it urgent? (Priority Suggestion)

- 🚨 **Urgent: YES**. >- πŸ”Ί CVSS: **9.8 (Critical)** β†’ `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`. >- πŸ“ Trivial to exploit in LAN. >- πŸ’‘ Patch immediately or apply strict network controls.