Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1961: Vulnerability in Red Hat Red Hat Satellite 6

0
High
VulnerabilityCVE-2026-1961cvecve-2026-1961
Published: Thu Mar 26 2026 (03/26/2026, 12:53:09 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Satellite 6

Description

A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 13:30:53 UTC

Technical Analysis

CVE-2026-1961 is a critical vulnerability identified in Red Hat Satellite 6, specifically within the Foreman component's WebSocket proxy implementation. The flaw stems from the improper handling of hostname values received from compute resource providers, which are incorporated into shell commands without adequate sanitization. This lack of input validation enables a remote attacker, who operates a malicious compute resource server, to inject arbitrary commands during the process of establishing a VM VNC console session. When a legitimate user accesses this functionality, the attacker’s payload executes on the Foreman server, resulting in remote code execution (RCE). The vulnerability impacts confidentiality, integrity, and availability by potentially exposing sensitive credentials and allowing full compromise of the managed infrastructure controlled by Satellite. The CVSS v3.1 score of 8.0 reflects the high severity, with an attack vector over the network, low attack complexity, requiring privileges and user interaction, and resulting in high impact across all security properties. Although no public exploits are known at this time, the nature of the vulnerability and its integration point in infrastructure management make it a critical risk. The vulnerability was reserved in early February 2026 and published in late March 2026, indicating recent discovery and disclosure. No patches or mitigations are explicitly listed in the provided data, emphasizing the need for immediate attention from affected organizations.

Potential Impact

The exploitation of CVE-2026-1961 can have severe consequences for organizations globally that rely on Red Hat Satellite 6 for infrastructure management. Successful remote code execution on the Foreman server can lead to full compromise of the managed environment, including unauthorized access to sensitive credentials, configuration data, and control over virtual machines and compute resources. This can result in data breaches, service disruptions, and lateral movement within the network. The vulnerability’s requirement for user interaction and privileges somewhat limits its exploitation scope but does not eliminate the risk, especially in environments with multiple administrators or automated workflows accessing VM consoles. Given Red Hat Satellite's role in managing large-scale Linux deployments, the impact extends to critical infrastructure, cloud environments, and enterprise data centers. The absence of known exploits in the wild suggests a window for proactive mitigation, but the high severity score demands urgent remediation to prevent potential targeted attacks.

Mitigation Recommendations

Organizations should immediately review and restrict access to compute resource providers to trusted entities only, minimizing exposure to potentially malicious servers. Implement strict input validation and sanitization on hostname values within the Foreman WebSocket proxy, if custom modifications are possible before official patches. Monitor and audit user activities related to VM VNC console access to detect unusual patterns indicative of exploitation attempts. Apply the latest security updates and patches from Red Hat as soon as they become available, as these will address the root cause. Consider isolating or segmenting the Satellite infrastructure to limit the blast radius in case of compromise. Employ multi-factor authentication and least privilege principles for users accessing Satellite management consoles. Additionally, maintain comprehensive backups and incident response plans tailored to infrastructure management platforms to enable rapid recovery if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-05T10:43:18.671Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c531a1f4197a8e3bc7dda8

Added to database: 3/26/2026, 1:16:17 PM

Last enriched: 3/26/2026, 1:30:53 PM

Last updated: 3/26/2026, 4:01:45 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses