netatalk.io

Netatalk Security Advisory

Subject DES-ECB auth with timing side channel
CVE ID# CVE-2026-44061
Severity Medium
Disclosure Date 2026/05/13
Affected Versions 1.5.0 - 4.4.2
Summary The Randnum UAM uses DES in ECB mode and compares authentication data with a non-constant-time comparison

Description

The legacy Randnum authentication mechanism uses obsolete cryptography and non-constant-time comparisons. This UAM is not enabled by default; if enabled, the main risk is password-equivalent exposure or offline attack rather than code execution or privilege escalation.

Patch Availability

Apply CVE-2026-44061.patch to a Netatalk 4.4.2 source tree to hotfix your local Netatalk deployment.

Alternatively, upgrade to Netatalk 4.5.0 or later, which includes the patch.

The Netatalk team does not encourage proactively applying the patch to existing deployments because of the low practical exploitability.

CVSS Calculation

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N (5.9)

Workaround

Disable the Randnum UAM and prefer stronger authentication methods.

Credits

Vulnerability reported by:

@00redbeer

Patch developed by:

Daniel Markstedt of the Netatalk team

References


Go back to the Security Policy.