← Volver a CVEs
CVE-2026-2733
LOW3.8
Descripcion
A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.
Detalles CVE
Puntuacion CVSS v3.13.8
SeveridadLOW
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado2/19/2026
Ultima modificacion3/5/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-285
Referencias
https://access.redhat.com/errata/RHSA-2026:3947(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2026:3948(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2026-2733(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2440895(secalert@redhat.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.