HKUDS OpenHarness Default Config Exposes Systems (CVE-2026-6823)
The National Vulnerability Database has issued an advisory for CVE-2026-6823, impacting HKUDS OpenHarness prior to PR #147. This high-severity vulnerability (CVSS 8.2) stems from an insecure default configuration where remote channels are set with allow_from = ["*"]. This permits arbitrary remote senders to bypass admission checks, granting unauthorized access.
Attackers who can reach the configured channel effectively bypass critical access controls. This allows them to interact with host-backed agent runtimes, according to the National Vulnerability Database. The immediate consequence is potential unauthorized file disclosure and read access through default-enabled read-only tools.
This isn’t a complex exploit; it’s a simple misconfiguration that opens the door. Defenders need to recognize that default-open settings are a gift to attackers. The attacker’s calculus is straightforward: find a reachable OpenHarness instance, leverage the default configuration, and start exfiltrating data. It’s low-effort, high-reward, particularly in environments where OpenHarness might be used for automation or data processing.
What This Means For You
- If your organization uses HKUDS OpenHarness, immediately verify your configurations. Any instance prior to PR #147 is vulnerable if `allow_from = ["*"]` is present on remote channels. This is not a theoretical risk; it's a direct path to data exposure. Audit your systems for OpenHarness installations and ensure this insecure default has been remediated.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6823 - OpenHarness Default Config Remote Channel Access
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6823 | Misconfiguration | HKUDS OpenHarness prior to PR #147 |
| CVE-2026-6823 | Information Disclosure | remote channels inherit allow_from = ["*"] |
| CVE-2026-6823 | Auth Bypass | arbitrary remote senders to pass admission checks |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 22, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.