CVE-2026-2733: Improper Authorization in Red Hat Red Hat Build of Keycloak
CVE-2026-2733 is a low-severity vulnerability in Red Hat Build of Keycloak affecting the Docker v2 authentication endpoint. The flaw allows tokens to be issued even after a Docker registry client has been administratively disabled, meaning that disabling the client does not fully block access. Consequently, previously valid credentials can still be used to obtain authentication tokens, weakening administrative controls. This could lead to unauthorized access to container registry resources. The vulnerability requires high privileges to exploit and does not need user interaction. No known exploits are currently reported in the wild. Organizations using Red Hat Build of Keycloak for Docker registry authentication should review their client management and consider additional controls to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-2733 identifies an improper authorization vulnerability in the Docker v2 authentication endpoint of the Red Hat Build of Keycloak. Specifically, when a Docker registry client is administratively disabled by setting its “Enabled” flag to OFF, the system erroneously continues to issue authentication tokens if previously valid credentials are presented. This indicates a failure in the authorization logic that should prevent token issuance once a client is disabled. The flaw undermines the intended administrative control mechanism designed to revoke access by disabling clients. Attackers or unauthorized users with previously valid credentials can exploit this weakness to obtain authentication tokens and gain access to container registry resources that should have been restricted. The vulnerability has a CVSS 3.1 base score of 3.8, reflecting low severity due to the requirement for high privileges (PR:H) to exploit, no user interaction, and limited impact on confidentiality and integrity. No known public exploits or active exploitation have been reported. The issue highlights the importance of robust token issuance and client state validation in authentication services, especially those managing container registries where unauthorized access could lead to supply chain risks or data exposure.
Potential Impact
For European organizations, this vulnerability could weaken administrative controls over container registry access, potentially allowing unauthorized access to container images and related resources. While the severity is low, the impact on confidentiality and integrity is non-negligible, especially for organizations relying heavily on containerized deployments and DevOps pipelines. Unauthorized access to container registries could lead to exposure of proprietary or sensitive container images, insertion of malicious code into images, or disruption of deployment workflows. This risk is particularly relevant for sectors with stringent compliance requirements such as finance, healthcare, and critical infrastructure. However, the requirement for high privileges to exploit limits the threat to insiders or attackers who have already gained elevated access. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation. Organizations with extensive use of Red Hat Build of Keycloak in their container infrastructure should assess their exposure and strengthen monitoring of authentication token issuance and client status changes.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Apply any available patches or updates from Red Hat promptly once released, as the current information does not list patch links but updates are expected. 2) Implement additional access controls around the management of Docker registry clients, including multi-factor authentication and strict role-based access control to limit who can disable clients. 3) Monitor authentication token issuance logs for anomalies, especially tokens issued to clients that have been administratively disabled. 4) Consider implementing short-lived tokens or token revocation mechanisms to reduce the window of unauthorized access. 5) Review and audit container registry client configurations regularly to ensure disabled clients are not inadvertently issuing tokens. 6) Employ network segmentation and container image scanning to detect and prevent unauthorized access or tampering. 7) Educate administrators about the limitations of the current client disablement mechanism and encourage manual verification of access revocation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-2733: Improper Authorization in Red Hat Red Hat Build of Keycloak
Description
CVE-2026-2733 is a low-severity vulnerability in Red Hat Build of Keycloak affecting the Docker v2 authentication endpoint. The flaw allows tokens to be issued even after a Docker registry client has been administratively disabled, meaning that disabling the client does not fully block access. Consequently, previously valid credentials can still be used to obtain authentication tokens, weakening administrative controls. This could lead to unauthorized access to container registry resources. The vulnerability requires high privileges to exploit and does not need user interaction. No known exploits are currently reported in the wild. Organizations using Red Hat Build of Keycloak for Docker registry authentication should review their client management and consider additional controls to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-2733 identifies an improper authorization vulnerability in the Docker v2 authentication endpoint of the Red Hat Build of Keycloak. Specifically, when a Docker registry client is administratively disabled by setting its “Enabled” flag to OFF, the system erroneously continues to issue authentication tokens if previously valid credentials are presented. This indicates a failure in the authorization logic that should prevent token issuance once a client is disabled. The flaw undermines the intended administrative control mechanism designed to revoke access by disabling clients. Attackers or unauthorized users with previously valid credentials can exploit this weakness to obtain authentication tokens and gain access to container registry resources that should have been restricted. The vulnerability has a CVSS 3.1 base score of 3.8, reflecting low severity due to the requirement for high privileges (PR:H) to exploit, no user interaction, and limited impact on confidentiality and integrity. No known public exploits or active exploitation have been reported. The issue highlights the importance of robust token issuance and client state validation in authentication services, especially those managing container registries where unauthorized access could lead to supply chain risks or data exposure.
Potential Impact
For European organizations, this vulnerability could weaken administrative controls over container registry access, potentially allowing unauthorized access to container images and related resources. While the severity is low, the impact on confidentiality and integrity is non-negligible, especially for organizations relying heavily on containerized deployments and DevOps pipelines. Unauthorized access to container registries could lead to exposure of proprietary or sensitive container images, insertion of malicious code into images, or disruption of deployment workflows. This risk is particularly relevant for sectors with stringent compliance requirements such as finance, healthcare, and critical infrastructure. However, the requirement for high privileges to exploit limits the threat to insiders or attackers who have already gained elevated access. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation. Organizations with extensive use of Red Hat Build of Keycloak in their container infrastructure should assess their exposure and strengthen monitoring of authentication token issuance and client status changes.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Apply any available patches or updates from Red Hat promptly once released, as the current information does not list patch links but updates are expected. 2) Implement additional access controls around the management of Docker registry clients, including multi-factor authentication and strict role-based access control to limit who can disable clients. 3) Monitor authentication token issuance logs for anomalies, especially tokens issued to clients that have been administratively disabled. 4) Consider implementing short-lived tokens or token revocation mechanisms to reduce the window of unauthorized access. 5) Review and audit container registry client configurations regularly to ensure disabled clients are not inadvertently issuing tokens. 6) Employ network segmentation and container image scanning to detect and prevent unauthorized access or tampering. 7) Educate administrators about the limitations of the current client disablement mechanism and encourage manual verification of access revocation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2026-02-19T07:15:32.860Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6996c21f6aea4a407a46d597
Added to database: 2/19/2026, 7:56:15 AM
Last enriched: 2/19/2026, 8:10:34 AM
Last updated: 2/19/2026, 9:12:40 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2736: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Alkacon OpenCms
MediumCVE-2026-2735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Alkacon OpenCms
MediumCVE-2026-27094: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GoDaddy CoBlocks
HighCVE-2026-27092: Missing Authorization in Greg Winiarski WPAdverts
HighCVE-2026-27090: Cross-Site Request Forgery (CSRF) in WP Moose Kenta Companion
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.