/ /

[HIGH] CVE-2026-27466 — CVSS 7.2 (February 21, 2026)

Share

A HIGH-severity vulnerability identified as CVE-2026-27466 has been published on February 21, 2026 with a CVSS base score of 7.2. This security advisory provides a detailed breakdown of the vulnerability, its potential impact, weakness classification, and actionable steps to protect your systems.

Vulnerability Details

CVE ID: CVE-2026-27466
Severity: HIGH
CVSS Score: 7.2
Published: February 21, 2026
Weakness (CWE): CWE-668

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactNone
Availability ImpactLow

Technical Description

BigBlueButton is an open-source virtual classroom. In versions 3.0.21 and below, the official documentation for "Server Customization" on Support for ClamAV as presentation file scanner contains instructions that leave a BBB server vulnerable for Denial of Service. The flawed command exposes both ports (3310 and 7357) to the internet. A remote attacker can use this to send complex or large documents to clamd and waste server resources, or shutdown the clamd process. The clamd documentation explicitly warns about exposing this port. Enabling ufw (ubuntu firewall) during install does not help, because Docker routes container traffic through the nat table, which is not managed or restricted by ufw. Rules installed by ufw in the filter table have no effect on docker traffic. In addition, the provided example also mounts /var/bigbluebutton with write permissions into the container, which should not be required. Future vulnerabilities in clamd may allow attackers to manipulate files in that folder. Users are unaffected unless they have opted in to follow the extra instructions from BigBlueButton's documentation. This issue has been fixed in version 3.0.22.

Potential Impact

If exploited, this high-severity vulnerability could allow an attacker to cause significant damage to affected systems. Organizations running affected software should treat this as a priority remediation item.

Recommended Action

No official patch is available yet. Until one is released:

  1. Monitor the official NVD page and vendor channels for patch announcements.
  2. Restrict access to the affected system or service where possible.
  3. Apply network-level mitigations such as firewall rules or WAF policies.
  4. Enable logging and alerting for anomalous activity related to this vulnerability.
  5. Review your incident response plan in case of active exploitation.

View full details on NVD →

References

Related Security Advisories

Your email address will not be published. Required fields are marked *

About

Cybersecurity specialist focused on protecting digital infrastructure and preventing cyber threats.

Technologies
  • ps

    Photoshop

    Professional image and graphic editing tool.

  • virtual data room

    Boundeal

    Secure VDR platform for confidential document sharing and collaboration

  • figma

    Figma

    Collaborate and design interfaces in real-time.

  • ai

    Illustrator

    Create precise vector graphics and illustrations.