PatchSiren cyber security CVE debrief
CVE-2023-32079 Netmaker CVE debrief
CVE-2023-32079 is a high-severity privilege-escalation flaw in Netmaker. According to the CVE/NVD record and the vendor advisory, a mass assignment issue could let a non-admin user escalate to admin privileges in affected releases. The issue is patched in 0.17.1 and fixed in 0.18.6.
- Vendor
- Netmaker
- Product
- Unknown
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-08-24
- Original CVE updated
- 2026-05-18
- Advisory published
- 2023-08-24
- Advisory updated
- 2026-05-18
Who should care
Netmaker operators, platform administrators, and teams running Netmaker-managed WireGuard networks should prioritize this advisory, especially if they allow non-admin users to interact with the application or API.
Technical summary
The NVD record classifies this as CVSS 3.1 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps it to CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes). The vulnerability affects Netmaker versions before 0.17.1 and versions 0.18.0 through 0.18.5. In those builds, a mass assignment issue could allow a non-admin user to escalate privileges to admin. The vendor advisory and NVD both identify 0.17.1 and 0.18.6 as fixed releases.
Defensive priority
High. This is a network-accessible privilege-escalation issue in infrastructure software, with potential impact to confidentiality, integrity, and availability if an attacker can obtain elevated privileges.
Recommended defensive actions
- Upgrade Netmaker to a fixed release immediately: 0.17.1 for the affected 0.17.x line, or 0.18.6 or later for the 0.18.x line.
- If you are on 0.17.1, follow the vendor guidance to pull the patched backend image (`docker pull gravitl/netmaker:v0.17.1`) and restart the stack (`docker-compose up -d`).
- If you are on 0.18.0 through 0.18.5, upgrade to 0.18.6 or later.
- Confirm the deployed backend/container version after remediation so the patched release is actually running.
- Review administrative accounts and recent privilege changes for unexpected additions or escalations after upgrading.
Evidence notes
Source evidence comes from the official NVD CVE record and the linked GitHub Security Advisory referenced by NVD. The NVD metadata lists affected version ranges as versions prior to 0.17.1 and 0.18.0 through 0.18.5, with fixed releases 0.17.1 and 0.18.6. The CVE was published on 2023-08-24; the 2026 modification timestamp should not be treated as the issue date.
Official resources
-
CVE-2023-32079 CVE record
CVE.org
-
CVE-2023-32079 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed on 2023-08-24 via the CVE/NVD record, with NVD referencing the Netmaker GitHub Security Advisory as the vendor advisory.