CVE-2026-42072
Arch · Nornicdb
Nornicdb fails to bind the Bolt server to the configured host, defaulting to all interfaces and exposing the database with default credentials to the network.
Executive summary
A configuration binding error in Nornicdb leaves the database exposed on all network interfaces with default credentials, allowing unauthenticated remote access.
Vulnerability
The Bolt server listener ignores the user-configured address and defaults to binding on all interfaces (0.0.0.0). When combined with default admin credentials, this enables unauthenticated remote attackers on the LAN to gain full control over the graph database.
Business impact
Exposure of a database containing sensitive graph and vector data can lead to massive data breaches and total loss of confidentiality. Because the service defaults to weak, well-known credentials, the barrier to entry for an attacker is extremely low. The 9.8 CVSS score reflects the high risk of compromise for any Nornicdb instance exposed on a network.
Remediation
Immediate Action: Upgrade Nornicdb to version 1.0.42-hotfix or later and immediately change the default admin credentials.
Proactive Monitoring: Audit network traffic for unauthorized access attempts to the Nornicdb port and review database access logs for unrecognized activity.
Compensating Controls: Ensure the database is placed behind a firewall that restricts access to the management port from untrusted network segments.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The combination of insecure default configurations and network exposure makes this a critical risk. Administrators must update to 1.0.42-hotfix immediately and enforce strong password policies for all administrative accounts to mitigate the risk of unauthorized database access.