# NSA's Discontinued GRASSMARLIN Tool Vulnerable to XML External Entity Attacks
## The Threat
NSA GRASSMARLIN, the agency's discontinued network analysis tool, contains a critical XML External Entity (XXE) vulnerability that could allow attackers with local system access to extract sensitive information from affected systems. The vulnerability exists in version 3.2.1 and potentially all versions of the tool, stemming from improper handling of XML parsing in session data processing.
GRASSMARLIN was originally developed by the NSA to provide network discovery and visualization for industrial control systems and critical infrastructure environments. The tool fell out of support in 2017 when the NSA archived the project, but many organizations have continued using it for legacy network analysis and security assessments. This vulnerability represents a persistent risk for any environment still relying on the outdated tool.
XXE vulnerabilities, categorized as CWE-611 (Improper Restriction of XML External Entity Reference), allow attackers to manipulate XML input to access unauthorized data, execute code, or perform denial-of-service attacks. When an application processes externally-supplied XML without proper validation, an attacker can inject malicious XML entities that reference external resources—potentially exposing files on the system or enabling further compromise. In this case, successful exploitation could disclose sensitive information accessible to the user running GRASSMARLIN.
## Severity and Impact
| Field | Value |
|-------|-------|
| CVE Identifier | CVE-2026-6807 |
| Affected Product | NSA GRASSMARLIN v3.2.1 and all versions |
| CVSS v3.1 Base Score | 5.5 (MEDIUM) |
| CVSS Vector String | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| Attack Vector | Local (AV:L) |
| Attack Complexity | Low (AC:L) |
| Privileges Required | Low (PR:L) |
| User Interaction | None (UI:N) |
| Scope | Unchanged (S:U) |
| Confidentiality Impact | High (C:H) |
| Integrity Impact | None (I:N) |
| Availability Impact | None (A:N) |
| CWE | CWE-611 |
| Vulnerability Type | XML External Entity Reference (XXE) |
The MEDIUM severity rating reflects a moderate risk profile: exploitation requires local system access and low-level privileges, but successful attacks result in high-impact information disclosure. This means that users or compromised low-privilege accounts on systems running GRASSMARLIN could leverage the vulnerability to access sensitive data, configuration files, or other protected information stored on the host system.
## Affected Products
NSA GRASSMARLIN
Organizations should treat all deployed instances of GRASSMARLIN as potentially vulnerable until proven otherwise.
## Mitigations
Critical Limitation: NSA declared GRASSMARLIN end-of-life in 2017 and has archived the project. No security patches, updates, or further support from NSA will be provided. Organizations relying on GRASSMARLIN must treat this as an unsupported tool with no vendor remediation available.
### Immediate Actions
Discontinuation and Replacement
The most effective mitigation is to decommission GRASSMARLIN and migrate to actively maintained network discovery and analysis tools. Consider alternatives such as:
Access Control Hardening
If immediate replacement is not feasible:
Network Isolation
Session Data Security
### Defense-in-Depth Practices
CISA recommends organizations implement the following broader defensive measures to protect critical infrastructure and control systems:
### Organizational Response
## References
---
Vulnerability Reporter: Grady DeRosa
Initial Publication: April 28, 2026
Current Status: No known public exploitation reported to CISA as of publication date