RHSA-2026:18584

Vulnerability from csaf_redhat - Published: 2026-05-19 07:44 - Updated: 2026-05-19 10:47
Summary
Red Hat Security Advisory: Assisted Installer RHEL 8 components for Multicluster Engine for Kubernetes 2.9.4
Severity
Important
Notes
Topic: Assisted installer RHEL 8 components for the multicluster engine for Kubernetes 2.9.4 General Availability release, with updates to container images.
Details: Assisted Installer RHEL 8 integrates components for the general multicluster engine for Kubernetes 2.9.4 release that simplify the process of deploying OpenShift Container Platform clusters. The multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters, or to import existing Kubernetes-based clusters for management. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A vulnerability in the assisted-service REST API, an optional Assisted Installer (assisted-service) component in the Multicluster Engine (MCE), allows an authenticated user with minimal namespace-scoped privileges to obtain administrative credentials for arbitrary clusters provisioned through the hub. The credentials download endpoint (GET /v2/clusters/{cluster_id}/credentials, which returns the kubeadmin password) and the kubeconfig download endpoint are operational in AUTH_TYPE=local mode, the only authentication mode available in on-premises ACM/MCE hub deployments. The local authenticator unconditionally grants full administrative access to any request bearing a valid JWT, with no per-endpoint restrictions. A valid local JWT is embedded as a plaintext query parameter in InfraEnvStatus.ISODownloadURL and is readable by any user who has get rights on an InfraEnv object in their own namespace. The affected components ship as part of Multicluster Engine (MCE). The Red Hat Advanced Cluster Management (ACM) deployments that include MCE are equally affected. This issue does not affect the hosted SaaS offering (console.redhat.com), which uses a different authentication mode. Successful exploitation gives the attacker the kubeadmin password and kubeconfig for any OpenShift cluster provisioned through the affected hub, granting unrestricted root-level administrative access to those spoke clusters.

CWE-312 - Cleartext Storage of Sensitive Information
Affected products
Product Identifier Version Remediation
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le
Vendor Fix fix
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x
Vendor Fix fix
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64
Vendor Fix fix
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64
Vendor Fix fix
Threats
Impact Important

A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.

CWE-131 - Incorrect Calculation of Buffer Size
Affected products
Product Identifier Version Remediation
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le
Vendor Fix fix
Workaround
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x
Vendor Fix fix
Workaround
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64
Vendor Fix fix
Workaround
Unresolved product id: multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64
Vendor Fix fix
Workaround
Threats
Impact Important
Acknowledgments
Red Hat Omer Vishlitzky Nick Carboni Riccardo Piccoli

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Assisted installer RHEL 8 components for the multicluster engine for Kubernetes 2.9.4 General Availability release, with updates to container images.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Assisted Installer RHEL 8 integrates components for the general multicluster engine\nfor Kubernetes 2.9.4 release that simplify the process of deploying OpenShift Container\nPlatform clusters.\n\nThe multicluster engine for Kubernetes provides the foundational components\nthat are necessary for the centralized management of multiple\nKubernetes-based clusters across data centers, public clouds, and private\nclouds.\n\nYou can use the engine to create new Red Hat OpenShift Container Platform\nclusters, or to import existing Kubernetes-based clusters for management.\n\nAfter the clusters are managed, you can use the APIs that\nare provided by the engine to distribute configuration based on placement\npolicy.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:18584",
        "url": "https://access.redhat.com/errata/RHSA-2026:18584"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2026-34986",
        "url": "https://access.redhat.com/security/cve/CVE-2026-34986"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2026-7163",
        "url": "https://access.redhat.com/security/cve/CVE-2026-7163"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_18584.json"
      }
    ],
    "title": "Red Hat Security Advisory: Assisted Installer RHEL 8 components for Multicluster Engine for Kubernetes 2.9.4",
    "tracking": {
      "current_release_date": "2026-05-19T10:47:58+00:00",
      "generator": {
        "date": "2026-05-19T10:47:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.8.0"
        }
      },
      "id": "RHSA-2026:18584",
      "initial_release_date": "2026-05-19T07:44:17+00:00",
      "revision_history": [
        {
          "date": "2026-05-19T07:44:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-05-19T07:44:19+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-05-19T10:47:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "multicluster engine for Kubernetes 2.9",
                "product": {
                  "name": "multicluster engine for Kubernetes 2.9",
                  "product_id": "multicluster engine for Kubernetes 2.9",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:multicluster_engine:2.9::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "multicluster engine for Kubernetes"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
                "product": {
                  "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
                  "product_id": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/assisted-service-8-rhel8@sha256%3Afc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6?arch=amd64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1778464111"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64",
                "product": {
                  "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64",
                  "product_id": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/assisted-service-8-rhel8@sha256%3Afec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b?arch=arm64\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1778464111"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
                "product": {
                  "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
                  "product_id": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/assisted-service-8-rhel8@sha256%3A1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f?arch=ppc64le\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1778464111"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
                "product": {
                  "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
                  "product_id": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/assisted-service-8-rhel8@sha256%3A9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50?arch=s390x\u0026repository_url=registry.redhat.io/multicluster-engine\u0026tag=1778464111"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le as a component of multicluster engine for Kubernetes 2.9",
          "product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le"
        },
        "product_reference": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
        "relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x as a component of multicluster engine for Kubernetes 2.9",
          "product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x"
        },
        "product_reference": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
        "relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64 as a component of multicluster engine for Kubernetes 2.9",
          "product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64"
        },
        "product_reference": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
        "relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64 as a component of multicluster engine for Kubernetes 2.9",
          "product_id": "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
        },
        "product_reference": "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64",
        "relates_to_product_reference": "multicluster engine for Kubernetes 2.9"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Omer Vishlitzky",
            "Nick Carboni",
            "Riccardo Piccoli"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2026-7163",
      "cwe": {
        "id": "CWE-312",
        "name": "Cleartext Storage of Sensitive Information"
      },
      "discovery_date": "2026-04-27T04:18:06.534000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2463152"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability in the assisted-service REST API, an optional Assisted Installer (assisted-service) component in the Multicluster Engine (MCE), allows an authenticated user with minimal namespace-scoped privileges to obtain administrative credentials for arbitrary clusters provisioned through the hub. \n\nThe credentials download endpoint (GET /v2/clusters/{cluster_id}/credentials, which returns the kubeadmin password) and the kubeconfig download endpoint are operational in AUTH_TYPE=local mode, the only authentication mode available in on-premises ACM/MCE hub deployments. The local authenticator unconditionally grants full administrative access to any request bearing a valid JWT, with no per-endpoint restrictions. A valid local JWT is embedded as a plaintext query parameter in InfraEnvStatus.ISODownloadURL and is readable by any user who has get rights on an InfraEnv object in their own namespace.\n\nThe affected components ship as part of Multicluster Engine (MCE). The Red Hat Advanced Cluster Management (ACM) deployments that include MCE are equally affected.\nThis issue does not affect the hosted SaaS offering (console.redhat.com), which uses a different authentication mode.\n\nSuccessful exploitation gives the attacker the kubeadmin password and kubeconfig for any OpenShift cluster provisioned through the affected hub, granting unrestricted root-level administrative access to those spoke clusters.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "assisted-service: assisted-service: Authenticated users can gain administrative access to OpenShift clusters via credential disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This is an Important vulnerability affecting on-premises deployments of Multicluster Engine (MCE) and Red Hat Advanced Cluster Management (ACM). An authenticated user with namespace-scoped privileges can exploit a flaw in the `assisted-service` REST API to retrieve administrative credentials for OpenShift clusters provisioned through the hub. This grants unrestricted root-level administrative access to affected spoke clusters, stemming from the `AUTH_TYPE=local` mode\u0027s unconditional administrative access with a valid local JWT, which is exposed in plaintext.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-7163"
        },
        {
          "category": "external",
          "summary": "RHBZ#2463152",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2463152"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-7163",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-7163"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-7163",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-7163"
        }
      ],
      "release_date": "2026-04-30T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-19T07:44:17+00:00",
          "details": "For more information about Assisted Installer, see the following documentation:\n\nhttps://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#cim-intro\n\nFor multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#mce-install-intro\n\nThis documentation will be available after the general availability release of Red Hat Advanced Cluster Management 2.14.",
          "product_ids": [
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:18584"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "assisted-service: assisted-service: Authenticated users can gain administrative access to OpenShift clusters via credential disclosure"
    },
    {
      "cve": "CVE-2026-34986",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "discovery_date": "2026-04-06T17:01:34.639203+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2455470"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Go JOSE, a library for handling JSON Web Encryption (JWE) objects. A remote attacker could exploit this vulnerability by providing a specially crafted JWE object. When decrypting such an object, if a key wrapping algorithm is specified but the encrypted key field is empty, the application can crash. This leads to a denial of service (DoS), making the affected service unavailable to legitimate users.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
          "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-34986"
        },
        {
          "category": "external",
          "summary": "RHBZ#2455470",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455470"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-34986",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-34986"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34986"
        },
        {
          "category": "external",
          "summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8",
          "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-78h2-9frx-2jm8"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants",
          "url": "https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants"
        }
      ],
      "release_date": "2026-04-06T16:22:45.353000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-19T07:44:17+00:00",
          "details": "For more information about Assisted Installer, see the following documentation:\n\nhttps://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#cim-intro\n\nFor multicluster engine for Kubernetes, see the following documentation for\ndetails on how to install the images:\n\nhttps://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.14/html/clusters/cluster_mce_overview#mce-install-intro\n\nThis documentation will be available after the general availability release of Red Hat Advanced Cluster Management 2.14.",
          "product_ids": [
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:18584"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:1a5ec032ec4d4833e2cd038ee1063479583d0c22d9e080b5394d2135ce35369f_ppc64le",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:9f73c8b0303fb8f6e392bbe25815c019dbc69c69f193bb6257bd6c1116f1cf50_s390x",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fc440baf4dbd00fc403741f3724ee36e5da716e41b775ac0ed4f8048971d10a6_amd64",
            "multicluster engine for Kubernetes 2.9:registry.redhat.io/multicluster-engine/assisted-service-8-rhel8@sha256:fec24ce70e2d31f2f21761cdef6cdc3ea6a62e98951c73a7a3eb6ef6720da01b_arm64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…