Security Advisory: Immediate Rotation of ‘ServiceBootstrap’ User Credentials

Date: 11th December 2025
Severity: High
Audience: All Self-Hosted Cumulocity Cloud & Cumulocity Edge Customers
Action Required: Immediate Password Rotation of ServiceBootstrap user.

Summary

We recently identified that the ‘servicebootstrap’ user password was inadvertently committed to a small number of our internal GitHub repositories. This credential is shipped by default, and instructions to update it during deployment are clearly provided in our documentation. However, we have observed a few installations where this default credential was used, i.e. it was not changed.

These credentials when compromised, could allow elevated administrative actions within the platform.

Impact on Self-Hosted Deployments

In the Self-hosted deployments, the ‘servicebootstrap’ user credentials may still be using this recently leaked password if not changed during installation. Hence, we strongly advise all self-hosted customers to rotate this password immediately to eliminate any risk.

Required Customer Action

Impact on Edge Deployments

Edge versions prior to 2025.0.7 needs atttention.

  • Required Action: Upgrade to the latest available Edge version. If upgrading is not feasible, please contact support.

Edge versions 2025.0.7 and later are NOT affected. During every installation, the ‘servicebootstrap’ user credentials are automatically and uniquely regenerated. This process ensures the default credential is never used.

  • Required Action: None.

Our Response

All internal and the public environments managed by Cumulocity cloud operations have had the credential rotated.

A long-term architectural change is underway to eliminate dependency on the servicebootstrap user for communication between microservices and the core platform. This will be replaced with a more robust and secure mechanism to prevent similar risks in the future.

Additional preventive controls have been implemented to avoid accidental secret commits, including:

  • Enhanced GitHub secret-scanning and repository monitoring
  • Automated CI checks for secret detection
  • Improved developer guidelines and periodic repository audits

Support

If you need assistance performing the password rotation or validating your environment, please contact our support team