A vulnerability in Remote Spark SparkView before build 1122 allows an attacker to bypasses the local connection check and achieve arbitrary code execution as root on the server side. Depending on implementation the vulnerability can be exploited by an unauthenticated attacker.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Customer can also set trustLocal = false in the gateway.conf as a workaround for this problem if they cannot update to build 1122 or later.

References
History

Fri, 08 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in Remote Spark SparkView before build 1122 allows an attacker to bypasses the local connection check and achieve arbitrary code execution as root on the server side. Depending on implementation the vulnerability can be exploited by an unauthenticated attacker.
Title Remote Spark SparkView RCE
Weaknesses CWE-290
CWE-807
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:A'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-05-08T12:45:06.500Z

Reserved: 2026-04-13T12:27:34.073Z

Link: CVE-2026-6213

cve-icon Vulnrichment

Updated: 2026-05-08T12:45:02.451Z

cve-icon NVD

Status : Received

Published: 2026-05-08T10:16:29.270

Modified: 2026-05-08T10:16:29.270

Link: CVE-2026-6213

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T10:30:06Z

Weaknesses