Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3622: Plaintext Storage of a Password

0
High
VulnerabilityCVE-2024-3622cvecve-2024-3622
Published: Thu Apr 25 2024 (04/25/2024, 17:46:29 UTC)
Source: CVE Database V5

Description

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:52:30 UTC

Technical Analysis

CVE-2024-3622 is a vulnerability identified in the deployment process of Quay container registry instances when installed using mirror-registry. The root cause is the use of a default secret key that is stored in plaintext within one of the configuration template files. Because this secret is not unique per deployment and is exposed in plaintext, all Quay instances installed this way share the same secret key. This secret is used to sign session cookies, so an attacker who obtains the secret can craft valid session cookies to impersonate legitimate users or administrators. The vulnerability has a CVSS 3.1 score of 8.8, indicating high severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. The flaw allows malicious actors to bypass authentication controls by forging session tokens, potentially leading to full system compromise. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to any organization deploying Quay via mirror-registry without changing the default secret.

Potential Impact

The impact of CVE-2024-3622 is substantial for organizations using Quay registries deployed through mirror-registry. Attackers can gain unauthorized access to the container registry, which may contain sensitive container images, credentials, and deployment artifacts. This unauthorized access can lead to data exfiltration, tampering with container images, insertion of malicious code, and disruption of containerized application deployments. The ability to forge session cookies undermines authentication and session management, increasing the risk of privilege escalation and lateral movement within the network. Given the widespread use of container registries in DevOps pipelines, this vulnerability could disrupt software supply chains and impact business continuity. Organizations relying on Quay for container image management must consider this a critical security risk.

Mitigation Recommendations

To mitigate CVE-2024-3622, organizations should immediately avoid deploying Quay using mirror-registry with default configuration templates containing plaintext secrets. They must generate and configure unique, strong secret keys for each Quay instance, ensuring these secrets are stored securely and not embedded in plaintext within configuration files. Implement strict access controls and encryption for configuration management. Regularly audit deployed configurations to detect any use of default or weak secrets. Additionally, monitor session activities for anomalies that may indicate forged cookies or unauthorized access. Applying any vendor patches or updates addressing this vulnerability as soon as they become available is critical. Finally, consider network segmentation and limiting access to the Quay registry to trusted users and systems to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-04-10T18:02:57.781Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3739f5a9374a9d10ff7

Added to database: 11/20/2025, 7:29:55 AM

Last enriched: 2/28/2026, 4:52:30 AM

Last updated: 3/24/2026, 7:47:09 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses