Tag
medium
advisory
Potential Data Exfiltration via Rclone
2 rules 3 TTPsAttackers are abusing the legitimate file synchronization tool rclone, often renamed to masquerade as legitimate software, to exfiltrate data to cloud storage or remote endpoints.
Elastic Defend
data-exfiltration
rclone
masquerading
2r
3t
critical
advisory
Rclone Unauthenticated options/set Allows Runtime Auth Bypass
2 rules 3 TTPsRclone is vulnerable to an unauthenticated options/set vulnerability that allows runtime authentication bypass, potentially leading to sensitive operations and command execution by setting `rc.NoAuth=true` on reachable RC servers started without global HTTP authentication.
rclone
auth-bypass
rc-api
CVE-2026-41176
command-execution
2r
3t