Enhanced security for encrypted tenant options

Security Alert

Title: Enhanced security for encrypted tenant options
Severity: High
Summary:
We have introduced a new security feature in the platform to address a potential vulnerability in the handling of encrypted tenant options prefixed with credentials.. Without this feature, system users with certain roles can decrypt any encrypted tenant option within the tenant, regardless of whether it logically belongs to them or not. This meant that ownership of sensitive configuration was not enforced, potentially exposing credentials across unrelated microservices.

To mitigate this, decryption of credentials.* options is now restricted to system users who own the tenant option. You are affected by this change if your microservice tries to read a ā€œcredentials.ā€ option that it does not own. Ownership is determined based on the category of the option in the following order:
-The settingsCategory defined in the microservice manifest.
-The microservice’s context path.
-The microservice name.

Recommended Action:
This feature is currently disabled by default, but can be enabled in a tenant via the secure-tenant-options feature toggle through the API

curl --location --request PUT ā€˜{url}/features/secure-tenant-options/by-tenant’
–header ā€˜Content-Type: application/json’
–data '{
ā€œactiveā€: true
}

:warning: Important:
This restriction will become mandatory in Q4 2025 for SaaS environments and in 2026 for yearly releases. We strongly recommend that developers review and update their microservices accordingly, especially if their services rely on decrypting credentials.* options in categories not explicitly owned by them.

Affected Versions: all versions
Fixed in: Cumulocity core CD release 2025.116.0 and the next annual release in 2026.

Contact:
If you have any questions or need assistance, please contact support.

2 Likes