Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-40344

CVE-2026-40344: MinIO Auth Bypass Vulnerability

CVE-2026-40344 is an authentication bypass vulnerability in MinIO's Snowball auto-extract handler that allows attackers to write objects to any bucket without valid credentials. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 23, 2026

CVE-2026-40344 Overview

CVE-2026-40344 is an authentication bypass vulnerability affecting MinIO, a high-performance object storage system. The flaw exists in MinIO's Snowball auto-extract handler (PutObjectExtractHandler), allowing any user who knows a valid access key to write arbitrary objects to any bucket without knowing the secret key or providing a valid cryptographic signature.

This vulnerability impacts MinIO versions starting from RELEASE.2023-05-18T00-05-36Z through versions prior to RELEASE.2026-04-11T03-20-12Z. The attack is particularly dangerous because it requires only a valid access key—which could be the well-known default minioadmin or any key with WRITE permission on a bucket—and a target bucket name.

Critical Impact

Any MinIO deployment running affected versions is vulnerable to unauthorized object writes, enabling attackers to inject malicious content, overwrite existing data, or store unauthorized files in any accessible bucket using only a valid access key.

Affected Products

  • MinIO RELEASE.2023-05-18T00-05-36Z through versions prior to RELEASE.2026-04-11T03-20-12Z
  • Any MinIO deployment using default credentials (minioadmin)
  • MinIO instances with users granted WRITE permissions on buckets

Discovery Timeline

  • 2026-04-22 - CVE CVE-2026-40344 published to NVD
  • 2026-04-22 - Last updated in NVD database

Technical Details for CVE-2026-40344

Vulnerability Analysis

The vulnerability stems from an incomplete implementation when authTypeStreamingUnsignedTrailer support was added to MinIO. While this authentication type was properly handled in PutObjectHandler and PutObjectPartHandler, it was never added to PutObjectExtractHandler—the handler responsible for Snowball auto-extract functionality.

The Snowball auto-extract handler's switch rAuthType block has no case for authTypeStreamingUnsignedTrailer, causing execution to fall through with zero signature verification. Although the isPutActionAllowed function is called before the switch statement and extracts the access key while checking IAM permissions, it critically does not verify the cryptographic signature.

This implementation gap allows an attacker to bypass authentication entirely by crafting a request that uses the unsigned trailer authentication type with a fabricated signature.

Root Cause

The root cause is a missing case handler in the authentication type switch block within PutObjectExtractHandler. When authTypeStreamingUnsignedTrailer was introduced as a new authentication type, developers updated PutObjectHandler and PutObjectPartHandler but overlooked PutObjectExtractHandler. This oversight created a code path where signature verification is completely bypassed while IAM permission checks still pass based solely on the access key presence.

The vulnerability is classified as CWE-287 (Improper Authentication), as the system fails to properly authenticate the user before allowing a security-sensitive action.

Attack Vector

An attacker exploits this vulnerability by sending a specially crafted PUT request to MinIO with the following characteristics:

  1. The request includes X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER header to trigger the unsigned trailer auth path
  2. The request includes X-Amz-Meta-Snowball-Auto-Extract: true header to route the request to the vulnerable handler
  3. The Authorization header contains a valid access key paired with a completely fabricated/invalid signature
  4. The request body contains a tar payload that will be extracted into the target bucket

When processed, the request passes IAM permission checks (which only verify the access key has WRITE permission) and bypasses signature verification entirely. The tar payload is then extracted into the specified bucket, allowing the attacker to write arbitrary objects without proper authentication.

Detection Methods for CVE-2026-40344

Indicators of Compromise

  • Unexpected objects appearing in MinIO buckets, particularly tar-extracted files
  • PUT requests to MinIO containing both X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER and X-Amz-Meta-Snowball-Auto-Extract: true headers
  • Authentication logs showing successful writes with mismatched or invalid signatures
  • Anomalous bucket activity from source IPs not associated with legitimate users

Detection Strategies

  • Monitor MinIO access logs for requests containing STREAMING-UNSIGNED-PAYLOAD-TRAILER in the content SHA256 header combined with Snowball auto-extract metadata
  • Implement signature validation alerts at the WAF or reverse proxy layer to detect requests with known valid access keys but invalid signature patterns
  • Deploy anomaly detection for bucket write operations, flagging unexpected tar extractions or sudden increases in object creation

Monitoring Recommendations

  • Enable detailed audit logging in MinIO to capture all authentication attempts and object operations
  • Configure SIEM rules to correlate access key usage patterns with signature validation failures
  • Establish baseline metrics for Snowball auto-extract operations and alert on deviations from normal usage patterns

How to Mitigate CVE-2026-40344

Immediate Actions Required

  • Upgrade MinIO to RELEASE.2026-04-11T03-20-12Z or later immediately
  • If using default credentials (minioadmin), rotate to strong, unique access keys immediately
  • Block unsigned-trailer requests at the load balancer or reverse proxy until patching is complete
  • Audit bucket contents for unauthorized objects that may have been written through exploitation

Patch Information

Users of the open-source minio/minio project should upgrade to MinIO AIStor RELEASE.2026-04-11T03-20-12Z or later. The fix adds proper handling for authTypeStreamingUnsignedTrailer in the PutObjectExtractHandler, ensuring cryptographic signature verification is performed for all authentication types.

For technical details on the fix, refer to the GitHub Commit and GitHub Pull Request. Additional context is available in the GitHub Security Advisory.

Workarounds

  • Block unsigned-trailer requests at the load balancer by rejecting any request containing X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER at the reverse proxy or WAF layer
  • Configure clients to use STREAMING-AWS4-HMAC-SHA256-PAYLOAD-TRAILER (the signed variant) instead of the unsigned trailer option
  • Restrict WRITE permissions by limiting s3:PutObject grants to trusted principals only (note: this reduces attack surface but does not eliminate the vulnerability since any user with WRITE permission can still exploit it)
  • Implement network segmentation to limit which systems can reach MinIO endpoints
bash
# Example NGINX configuration to block vulnerable requests
location / {
    if ($http_x_amz_content_sha256 = "STREAMING-UNSIGNED-PAYLOAD-TRAILER") {
        return 403 "Unsigned trailer requests blocked for security";
    }
    proxy_pass http://minio-backend;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechMinio

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.15%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-287
  • Technical References
  • GitHub Commit Update

  • GitHub Pull Request

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-41145: MinIO Auth Bypass Vulnerability

  • CVE-2026-34204: MinIO Auth Bypass Vulnerability

  • CVE-2026-33419: MinIO AIStor Auth Bypass Vulnerability

  • CVE-2026-33322: MinIO Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English