The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-28432

CVE-2023-28432: Minio Information Disclosure Vulnerability

CVE-2023-28432 is an information disclosure vulnerability in Minio that exposes sensitive environment variables including secret keys and passwords in cluster deployments. This article covers technical details, affected versions, and mitigation.

Published: February 11, 2026

CVE-2023-28432 Overview

CVE-2023-28432 is a critical information disclosure vulnerability affecting MinIO, a popular Multi-Cloud Object Storage framework. In cluster deployments starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables through an unauthenticated API endpoint, including sensitive credentials such as MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. This vulnerability allows remote attackers to obtain administrative credentials without authentication, potentially leading to complete compromise of the storage infrastructure.

Critical Impact

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog and is actively being exploited in the wild. Attackers can obtain root credentials to MinIO clusters, enabling unauthorized access to stored data, data exfiltration, and potential lateral movement within cloud environments.

Affected Products

  • MinIO cluster deployments from RELEASE.2019-12-17T23-16-33Z to before RELEASE.2023-03-20T20-16-18Z
  • MinIO distributed deployment configurations
  • MinIO containerized deployments in multi-node configurations

Discovery Timeline

  • 2023-03-22 - CVE-2023-28432 published to NVD
  • 2025-10-24 - Last updated in NVD database

Technical Details for CVE-2023-28432

Vulnerability Analysis

This information disclosure vulnerability (CWE-200) exists in MinIO's cluster bootstrap verification endpoint. When MinIO operates in distributed mode, the /minio/bootstrap/verify endpoint is exposed to handle cluster node verification during startup. However, this endpoint lacks proper authentication controls and inadvertently returns all environment variables configured for the MinIO process.

The vulnerability is particularly severe because MinIO stores critical authentication credentials as environment variables, including MINIO_SECRET_KEY (used in older versions) and MINIO_ROOT_PASSWORD (used in newer versions). An attacker who can reach this endpoint can harvest these credentials and gain full administrative access to the MinIO deployment.

According to GreyNoise tracking data, active exploitation of this vulnerability has been observed in the wild, with attackers scanning for vulnerable MinIO instances across the internet.

Root Cause

The root cause of this vulnerability lies in the improper access control implementation for the bootstrap verification endpoint in MinIO's distributed deployment mode. The endpoint was designed for internal cluster communication during node synchronization but was inadvertently exposed without authentication requirements. When a POST request is made to the /minio/bootstrap/verify endpoint, the server responds with environment variable data as part of its verification response, exposing sensitive configuration including authentication credentials.

Attack Vector

The attack vector is network-based and requires no authentication or user interaction. An attacker can exploit this vulnerability by sending a crafted HTTP POST request to the vulnerable endpoint on any exposed MinIO cluster node. The attack flow typically involves:

  1. Reconnaissance to identify MinIO instances (typically running on port 9000)
  2. Sending a POST request to /minio/bootstrap/verify with appropriate headers
  3. Parsing the response to extract MINIO_ROOT_PASSWORD or MINIO_SECRET_KEY
  4. Using harvested credentials to authenticate as administrator

The vulnerability can be exploited remotely with a simple HTTP POST request to the bootstrap verification endpoint. Attackers send a request to /minio/bootstrap/verify with the content type set to application/x-www-form-urlencoded, and the server responds with all environment variables including MINIO_ROOT_USER and MINIO_ROOT_PASSWORD. See the GitHub Security Advisory for complete technical details.

Detection Methods for CVE-2023-28432

Indicators of Compromise

  • Unexpected HTTP POST requests to /minio/bootstrap/verify endpoint from external IP addresses
  • Authentication events using MinIO root credentials from unfamiliar sources or IP addresses
  • Anomalous API activity or data access patterns following potential credential exposure
  • Network traffic analysis showing responses containing environment variable data

Detection Strategies

  • Monitor web server access logs for POST requests targeting /minio/bootstrap/verify endpoint
  • Implement network intrusion detection rules to alert on bootstrap verification endpoint access from untrusted networks
  • Review MinIO audit logs for authentication events using root credentials from unexpected sources
  • Leverage threat intelligence feeds such as GreyNoise to identify known malicious IPs scanning for this vulnerability

Monitoring Recommendations

  • Configure alerting for any external access attempts to MinIO bootstrap endpoints
  • Implement continuous monitoring of MinIO authentication logs for credential misuse
  • Deploy network segmentation monitoring to detect unauthorized access to storage infrastructure
  • Regularly audit MinIO access logs and correlate with threat intelligence for known exploitation attempts

How to Mitigate CVE-2023-28432

Immediate Actions Required

  • Upgrade MinIO to RELEASE.2023-03-20T20-16-18Z or later immediately
  • Rotate all MinIO credentials (MINIO_ROOT_USER, MINIO_ROOT_PASSWORD, MINIO_SECRET_KEY) after upgrading
  • Review access logs for evidence of exploitation and unauthorized access
  • Restrict network access to MinIO management endpoints using firewall rules or network segmentation
  • Audit all data accessed using potentially compromised credentials

Patch Information

MinIO has released a security patch in version RELEASE.2023-03-20T20-16-18Z that addresses this vulnerability. The fix implements proper access controls on the bootstrap verification endpoint to prevent unauthorized access to environment variables. All users of distributed MinIO deployments should upgrade to this version or later. The patched release is available from the MinIO GitHub releases page. Additional details are available in the GitHub Security Advisory.

Workarounds

  • Block external access to the /minio/bootstrap/verify endpoint using a reverse proxy or web application firewall
  • Implement network-level restrictions to ensure only trusted cluster nodes can communicate on MinIO ports
  • Deploy MinIO behind a VPN or private network segment to limit exposure
  • Use container image scanning tools to identify vulnerable MinIO versions in your environment, as recommended by GreyNoise
bash
# Example nginx configuration to block bootstrap endpoint
location /minio/bootstrap/verify {
    deny all;
    return 403;
}

# Firewall rule to restrict MinIO access (iptables example)
iptables -A INPUT -p tcp --dport 9000 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 9000 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechMinio

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability93.93%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-200

  • NVD-CWE-noinfo
  • Technical References
  • MinIO Release Note

  • Twitter Status Update

  • GreyNoise Information Disclosure

  • GreyNoise Blog Post

  • CISA Known Exploit Catalog
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-34204: MinIO Auth Bypass Vulnerability

  • CVE-2026-33419: MinIO AIStor Auth Bypass Vulnerability

  • CVE-2026-33322: MinIO Auth Bypass Vulnerability

  • CVE-2023-28434: Minio Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English