CVE-2024-3622: Plaintext Storage of a Password
A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.
AI Analysis
Technical Summary
CVE-2024-3622 is a vulnerability identified in the deployment process of Quay container registry instances when installed using mirror-registry. The root cause is the use of a default secret key that is stored in plaintext within one of the configuration template files. Because this secret is not unique per deployment and is exposed in plaintext, all Quay instances installed this way share the same secret key. This secret is used to sign session cookies, so an attacker who obtains the secret can craft valid session cookies to impersonate legitimate users or administrators. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. The flaw allows malicious actors to bypass authentication controls by forging session tokens, potentially leading to full system compromise. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to any organization deploying Quay via mirror-registry without changing the default secret.
Potential Impact
The impact of CVE-2024-3622 is substantial for organizations using Quay registries deployed through mirror-registry. Attackers can gain unauthorized access to the container registry, which may contain sensitive container images, credentials, and deployment artifacts. This unauthorized access can lead to data exfiltration, tampering with container images, insertion of malicious code, and disruption of containerized application deployments. The ability to forge session cookies undermines authentication and session management, increasing the risk of privilege escalation and lateral movement within the network. Given the widespread use of container registries in DevOps pipelines, this vulnerability could disrupt software supply chains and impact business continuity. Organizations relying on Quay for container image management must consider this a critical security risk.
Mitigation Recommendations
To mitigate CVE-2024-3622, organizations should immediately avoid deploying Quay using mirror-registry with default configuration templates containing plaintext secrets. They must generate and configure unique, strong secret keys for each Quay instance, ensuring these secrets are stored securely and not embedded in plaintext within configuration files. Implement strict access controls and encryption for configuration management. Regularly audit deployed configurations to detect any use of default or weak secrets. Additionally, monitor session activities for anomalies that may indicate forged cookies or unauthorized access. Applying any vendor patches or updates addressing this vulnerability as soon as they become available is critical. Finally, consider network segmentation and limiting access to the Quay registry to trusted users and systems to reduce attack surface.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, Australia, Netherlands, India, South Korea
CVE-2024-3622: Plaintext Storage of a Password
Description
A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-3622 is a vulnerability identified in the deployment process of Quay container registry instances when installed using mirror-registry. The root cause is the use of a default secret key that is stored in plaintext within one of the configuration template files. Because this secret is not unique per deployment and is exposed in plaintext, all Quay instances installed this way share the same secret key. This secret is used to sign session cookies, so an attacker who obtains the secret can craft valid session cookies to impersonate legitimate users or administrators. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. The flaw allows malicious actors to bypass authentication controls by forging session tokens, potentially leading to full system compromise. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to any organization deploying Quay via mirror-registry without changing the default secret.
Potential Impact
The impact of CVE-2024-3622 is substantial for organizations using Quay registries deployed through mirror-registry. Attackers can gain unauthorized access to the container registry, which may contain sensitive container images, credentials, and deployment artifacts. This unauthorized access can lead to data exfiltration, tampering with container images, insertion of malicious code, and disruption of containerized application deployments. The ability to forge session cookies undermines authentication and session management, increasing the risk of privilege escalation and lateral movement within the network. Given the widespread use of container registries in DevOps pipelines, this vulnerability could disrupt software supply chains and impact business continuity. Organizations relying on Quay for container image management must consider this a critical security risk.
Mitigation Recommendations
To mitigate CVE-2024-3622, organizations should immediately avoid deploying Quay using mirror-registry with default configuration templates containing plaintext secrets. They must generate and configure unique, strong secret keys for each Quay instance, ensuring these secrets are stored securely and not embedded in plaintext within configuration files. Implement strict access controls and encryption for configuration management. Regularly audit deployed configurations to detect any use of default or weak secrets. Additionally, monitor session activities for anomalies that may indicate forged cookies or unauthorized access. Applying any vendor patches or updates addressing this vulnerability as soon as they become available is critical. Finally, consider network segmentation and limiting access to the Quay registry to trusted users and systems to reduce attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2024-04-10T18:02:57.781Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ec3739f5a9374a9d10ff7
Added to database: 11/20/2025, 7:29:55 AM
Last enriched: 2/28/2026, 4:52:30 AM
Last updated: 3/24/2026, 7:47:09 PM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.