Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22723: Vulnerability in Cloudfoundry Foundation UAA

0
Medium
VulnerabilityCVE-2026-22723cvecve-2026-22723
Published: Thu Mar 05 2026 (03/05/2026, 20:40:27 UTC)
Source: CVE Database V5
Vendor/Project: Cloudfoundry Foundation
Product: UAA

Description

Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0.

AI-Powered Analysis

AILast updated: 03/05/2026, 21:16:02 UTC

Technical Analysis

CVE-2026-22723 is a vulnerability identified in the Cloudfoundry Foundation's User Account and Authentication (UAA) service, specifically affecting versions 77.30.0 through 78.7.0 and Cloudfoundry Deployment versions 48.7.0 through 54.10.0. The issue stems from a logic error in the implementation of the token revocation endpoint. This flaw causes inappropriate revocation of user tokens, meaning that tokens may be invalidated incorrectly or prematurely. Since UAA is a core component responsible for authentication and authorization in Cloudfoundry environments, improper token revocation can lead to denial of service conditions where legitimate users lose access unexpectedly. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, but the potential for disruption in cloud-native application environments is significant. The vulnerability requires an attacker to have some level of privilege but can be exploited remotely over the network without user interaction. The flaw highlights the importance of robust token lifecycle management in identity services.

Potential Impact

The primary impact of CVE-2026-22723 is denial of service through inappropriate token revocation, which disrupts user access to Cloudfoundry-managed resources. Organizations relying on Cloudfoundry UAA for authentication and authorization may experience service interruptions, affecting developer productivity and application availability. While confidentiality and integrity remain intact, the availability impact can cascade, especially in environments with automated deployment pipelines and continuous integration/continuous deployment (CI/CD) workflows dependent on stable authentication services. This could lead to operational delays, increased support costs, and potential SLA violations. The requirement for low privileges to exploit the vulnerability increases risk within internal networks or compromised accounts. Although no active exploits are known, the medium severity and ease of exploitation warrant proactive mitigation to prevent potential denial of service attacks that could affect cloud infrastructure and services globally.

Mitigation Recommendations

To mitigate CVE-2026-22723, organizations should promptly upgrade affected Cloudfoundry UAA and Deployment versions to patched releases once available from the vendor. In the interim, restrict network access to the token revocation endpoint to trusted administrators and internal systems only, using network segmentation and firewall rules. Implement strict privilege management to limit who can invoke token revocation operations. Monitor authentication logs for unusual token revocation activity that could indicate exploitation attempts. Employ rate limiting on the token revocation endpoint to reduce the risk of mass token invalidation. Additionally, consider deploying compensating controls such as redundant authentication services or fallback mechanisms to maintain availability during remediation. Regularly review and test identity and access management workflows to ensure resilience against token lifecycle issues. Engage with Cloudfoundry Foundation security advisories for updates and patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:36.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a9ef11c48b3f10ff4d065b

Added to database: 3/5/2026, 9:01:05 PM

Last enriched: 3/5/2026, 9:16:02 PM

Last updated: 3/5/2026, 10:32:50 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses