CVE-2022-46463 Overview
CVE-2022-46463 is an access control vulnerability affecting Harbor, the popular open-source container registry from the Linux Foundation. The vulnerability allows attackers to access both public and private image repositories without authentication, potentially exposing sensitive container images and intellectual property.
Harbor is widely used in enterprise DevOps environments as a trusted registry for storing and distributing container images. This vulnerability represents a significant security concern for organizations relying on Harbor's access control mechanisms to protect their container assets.
Critical Impact
Unauthenticated attackers can access private container image repositories, potentially exposing proprietary software, credentials embedded in images, and sensitive configuration data.
Affected Products
- Harbor versions 1.X.X through 2.5.3
- Linux Foundation Harbor container registry deployments
- Enterprise environments using Harbor for private image storage
Discovery Timeline
- 2023-01-13 - CVE-2022-46463 published to NVD
- 2025-04-08 - Last updated in NVD database
Technical Details for CVE-2022-46463
Vulnerability Analysis
This vulnerability is classified under CWE-306 (Missing Authentication for Critical Function). The flaw exists in Harbor's access control implementation, where authentication checks are not properly enforced for repository access operations. This allows unauthenticated users to retrieve container images from repositories that should be protected.
The vulnerability is particularly concerning because container images often contain sensitive data including application source code, configuration files, environment variables, API keys, and database credentials. An attacker exploiting this vulnerability could extract this information to further compromise the affected organization's infrastructure.
It's worth noting that the vendor has characterized this behavior as a documented feature rather than a security flaw. However, the security community has raised concerns about the default behavior allowing unauthenticated access to resources that administrators may expect to be protected.
Root Cause
The root cause stems from missing authentication enforcement for critical repository access functions. Harbor's access control model does not adequately verify user authentication status before granting access to image repository contents. This architectural decision allows anonymous users to enumerate and pull images from repositories that lack explicit access restrictions, even when the repository visibility settings might suggest otherwise.
Attack Vector
The attack can be executed remotely over the network without requiring any authentication credentials. An attacker needs only network access to the Harbor registry endpoint to begin exploitation. The attack flow involves:
- Identifying an exposed Harbor registry instance
- Enumerating available repositories through the Harbor API
- Pulling container images from both public and private repositories without authentication
- Extracting sensitive data from the retrieved container image layers
The vulnerability can be exploited using standard Docker or container runtime tools, as well as direct API calls to the Harbor registry endpoints. No special tooling or exploit code is required, making this vulnerability easily exploitable by attackers of varying skill levels.
Detection Methods for CVE-2022-46463
Indicators of Compromise
- Unusual or unexpected image pull requests from unauthenticated sources in Harbor access logs
- High volume of repository enumeration API requests from external IP addresses
- Anonymous image pulls from repositories intended to be private
- Access patterns from unfamiliar IP addresses or geographic regions
Detection Strategies
- Monitor Harbor audit logs for unauthenticated repository access attempts
- Implement network monitoring to detect unusual traffic patterns to Harbor API endpoints
- Configure alerting for image pull operations that bypass authentication
- Review Harbor access logs for enumeration patterns indicating reconnaissance activity
Monitoring Recommendations
- Enable detailed audit logging for all Harbor repository operations
- Deploy network intrusion detection rules to identify Harbor API abuse
- Implement real-time alerting for any unauthenticated access to private repositories
- Regularly audit user authentication patterns and flag anomalies
How to Mitigate CVE-2022-46463
Immediate Actions Required
- Upgrade Harbor to version 2.5.4 or later where additional access controls have been implemented
- Review and audit all repository visibility settings to ensure proper access restrictions
- Implement network-level access controls to restrict Harbor API exposure
- Enable mandatory authentication for all registry operations where possible
Patch Information
Organizations should upgrade to Harbor version 2.6.0 or later, which includes enhanced access control features. For environments where immediate upgrades are not feasible, administrators should carefully review the Harbor documentation regarding repository visibility settings and implement compensating controls.
For the latest security guidance, consult the Harbor GitHub repository and official documentation for security configuration best practices.
Workarounds
- Restrict network access to Harbor instances using firewall rules or network segmentation
- Place Harbor behind a reverse proxy that enforces authentication for all requests
- Disable anonymous access entirely in Harbor configuration settings
- Implement robot accounts with scoped permissions for CI/CD integrations
- Consider using Harbor's project-level access controls to enforce authentication requirements
# Configuration example - Disable anonymous access in Harbor
# Edit harbor.yml configuration file
# Set the following parameters:
# Disable self-registration
self_registration: off
# Require authentication for all operations
# Configure in the Harbor admin console:
# Administration > Configuration > Authentication
# Set "Project Creation" to "Only Admin can create projects"
# Disable public project creation
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


