CVE-2026-33419 PUBLISHED

MinIO: LDAP login brute-force via user enumeration and missing rate limit

Assigner: GitHub_M
Reserved: 19.03.2026 Published: 24.03.2026 Updated: 25.03.2026

MinIO is a high-performance object storage system. Prior to RELEASE.2026-03-17T21-25-16Z, MinIO AIStor's STS (Security Token Service) AssumeRoleWithLDAPIdentity endpoint is vulnerable to LDAP credential brute-forcing due to two combined weaknesses: (1) distinguishable error responses that enable username enumeration, and (2) absence of rate limiting on authentication attempts. An unauthenticated network attacker can enumerate valid LDAP usernames and then perform unlimited password guessing to obtain temporary AWS-style STS credentials, gaining access to the victim's S3 buckets and objects. This issue has been patched in RELEASE.2026-03-17T21-25-16Z.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.1

Product Status

Vendor minio
Product minio
Versions
  • Version < RELEASE.2026-03-17T21-25-16Z is affected

References

Problem Types

  • CWE-204: Observable Response Discrepancy CWE
  • CWE-307: Improper Restriction of Excessive Authentication Attempts CWE