← Zuruck zu CVEs
CVE-2026-2733
LOW3.8
Beschreibung
A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.
CVE Details
CVSS v3.1 Bewertung3.8
SchweregradLOW
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht2/19/2026
Zuletzt geandert3/5/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-285
Referenzen
https://access.redhat.com/errata/RHSA-2026:3947(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2026:3948(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2026-2733(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2440895(secalert@redhat.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.