Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2733: Improper Authorization in Red Hat Red Hat Build of Keycloak

0
Low
VulnerabilityCVE-2026-2733cvecve-2026-2733
Published: Thu Feb 19 2026 (02/19/2026, 07:48:08 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Build of Keycloak

Description

CVE-2026-2733 is a low-severity vulnerability in Red Hat Build of Keycloak affecting the Docker v2 authentication endpoint. The flaw allows tokens to be issued even after a Docker registry client has been administratively disabled, meaning that disabling the client does not fully block access. Consequently, previously valid credentials can still be used to obtain authentication tokens, weakening administrative controls. This could lead to unauthorized access to container registry resources. The vulnerability requires high privileges to exploit and does not need user interaction. No known exploits are currently reported in the wild. Organizations using Red Hat Build of Keycloak for Docker registry authentication should review their client management and consider additional controls to mitigate risk.

AI-Powered Analysis

AILast updated: 02/19/2026, 08:10:34 UTC

Technical Analysis

CVE-2026-2733 identifies an improper authorization vulnerability in the Docker v2 authentication endpoint of the Red Hat Build of Keycloak. Specifically, when a Docker registry client is administratively disabled by setting its “Enabled” flag to OFF, the system erroneously continues to issue authentication tokens if previously valid credentials are presented. This indicates a failure in the authorization logic that should prevent token issuance once a client is disabled. The flaw undermines the intended administrative control mechanism designed to revoke access by disabling clients. Attackers or unauthorized users with previously valid credentials can exploit this weakness to obtain authentication tokens and gain access to container registry resources that should have been restricted. The vulnerability has a CVSS 3.1 base score of 3.8, reflecting low severity due to the requirement for high privileges (PR:H) to exploit, no user interaction, and limited impact on confidentiality and integrity. No known public exploits or active exploitation have been reported. The issue highlights the importance of robust token issuance and client state validation in authentication services, especially those managing container registries where unauthorized access could lead to supply chain risks or data exposure.

Potential Impact

For European organizations, this vulnerability could weaken administrative controls over container registry access, potentially allowing unauthorized access to container images and related resources. While the severity is low, the impact on confidentiality and integrity is non-negligible, especially for organizations relying heavily on containerized deployments and DevOps pipelines. Unauthorized access to container registries could lead to exposure of proprietary or sensitive container images, insertion of malicious code into images, or disruption of deployment workflows. This risk is particularly relevant for sectors with stringent compliance requirements such as finance, healthcare, and critical infrastructure. However, the requirement for high privileges to exploit limits the threat to insiders or attackers who have already gained elevated access. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation. Organizations with extensive use of Red Hat Build of Keycloak in their container infrastructure should assess their exposure and strengthen monitoring of authentication token issuance and client status changes.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply any available patches or updates from Red Hat promptly once released, as the current information does not list patch links but updates are expected. 2) Implement additional access controls around the management of Docker registry clients, including multi-factor authentication and strict role-based access control to limit who can disable clients. 3) Monitor authentication token issuance logs for anomalies, especially tokens issued to clients that have been administratively disabled. 4) Consider implementing short-lived tokens or token revocation mechanisms to reduce the window of unauthorized access. 5) Review and audit container registry client configurations regularly to ensure disabled clients are not inadvertently issuing tokens. 6) Employ network segmentation and container image scanning to detect and prevent unauthorized access or tampering. 7) Educate administrators about the limitations of the current client disablement mechanism and encourage manual verification of access revocation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-19T07:15:32.860Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996c21f6aea4a407a46d597

Added to database: 2/19/2026, 7:56:15 AM

Last enriched: 2/19/2026, 8:10:34 AM

Last updated: 2/19/2026, 9:12:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats