EUVD-2026-12667

| CVE-2026-22727 HIGH
2026-03-17 vmware
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 17, 2026 - 23:02 euvd
EUVD-2026-12667
Analysis Generated
Mar 17, 2026 - 23:02 vuln.today
CVE Published
Mar 17, 2026 - 22:45 nvd
HIGH 7.5

Description

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing them to access secure application information.

Analysis

Cloud Foundry CAPI Release contains unprotected internal endpoints that allow attackers who have bypassed perimeter firewall controls to replace application droplets and access sensitive application data. The vulnerability affects Cloud Foundry CAPI Release version 1.226.0 and earlier, and CF Deployment version 54.9.0 and earlier across all platforms. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Audit firewall rules and network segmentation to identify and restrict unauthorized access to Cloud Foundry internal endpoints; verify current CF Deployment and Capi Release versions across all environments. Within 7 days: Implement enhanced monitoring and logging on internal Cloud Foundry endpoints; conduct threat assessment to identify critical applications at highest risk of compromise. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2026-12667 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy