Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33879: CWE-307: Improper Restriction of Excessive Authentication Attempts in londonaicentre FLIP

0
Low
VulnerabilityCVE-2026-33879cvecve-2026-33879cwe-307
Published: Fri Mar 27 2026 (03/27/2026, 20:31:50 UTC)
Source: CVE Database V5
Vendor/Project: londonaicentre
Product: FLIP

Description

Federated Learning and Interoperability Platform (FLIP) is an open-source platform for federated training and evaluation of medical imaging AI models across healthcare institutions. The FLIP login page in versions 0.1.1 and prior has no rate limiting or CAPTCHA, enabling brute-force and credential-stuffing attacks. FLIP users are external to the organization, increasing credential reuse risk. As of time of publication, it is unclear if a patch is available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 21:00:41 UTC

Technical Analysis

The Federated Learning and Interoperability Platform (FLIP) developed by londonaicentre is an open-source platform designed to facilitate federated training and evaluation of medical imaging AI models across multiple healthcare institutions. Versions 0.1.1 and earlier of FLIP contain a security vulnerability identified as CVE-2026-33879, classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts). Specifically, the FLIP login page does not implement any rate limiting or CAPTCHA mechanisms, allowing attackers to perform unlimited authentication attempts. This absence of controls enables brute-force and credential-stuffing attacks, where attackers systematically try numerous password combinations or reused credentials to gain unauthorized access. Since FLIP users are external to the organizations hosting the platform, the risk of credential reuse attacks is elevated, as attackers may leverage leaked credentials from other breaches. The vulnerability has a CVSS 4.0 base score of 2.7, indicating low severity primarily due to the lack of direct impact on confidentiality, integrity, or availability without successful authentication. No patches or fixes have been published at the time of disclosure, and no known exploits are in the wild. The vulnerability's exploitation could lead to unauthorized access to federated learning environments, potentially exposing sensitive medical AI model data or enabling manipulation of training processes. Given the critical nature of medical data and AI model integrity, this vulnerability poses a notable risk to healthcare institutions collaborating via FLIP. Organizations using FLIP should prioritize implementing protective measures to mitigate brute-force risks while awaiting official patches.

Potential Impact

The primary impact of CVE-2026-33879 is the increased risk of unauthorized access to FLIP instances through brute-force or credential-stuffing attacks. Successful exploitation could allow attackers to compromise user accounts, potentially exposing sensitive medical imaging AI training data or enabling manipulation of federated learning processes. This could undermine the confidentiality and integrity of AI models used for critical healthcare diagnostics. Although the CVSS score is low, the specialized nature of FLIP and its use in healthcare elevates the potential consequences. Credential reuse risk is significant because FLIP users are external and may use passwords compromised elsewhere. Additionally, unauthorized access could facilitate lateral movement within healthcare networks or data exfiltration. The lack of rate limiting also increases the likelihood of automated attacks succeeding over time. While no direct availability impact is indicated, the breach of trust and data integrity in medical AI systems could have downstream effects on patient care quality and regulatory compliance. Overall, the vulnerability poses a moderate operational and reputational risk to organizations deploying FLIP in sensitive healthcare environments.

Mitigation Recommendations

To mitigate CVE-2026-33879, organizations should implement immediate compensating controls given the absence of an official patch. Key recommendations include: 1) Deploy rate limiting on the FLIP login endpoint to restrict the number of authentication attempts per IP address or user account within a defined time window. 2) Integrate CAPTCHA challenges on the login page to prevent automated brute-force attacks. 3) Enforce strong password policies and encourage users to avoid credential reuse by leveraging password managers and multi-factor authentication (MFA) where possible. 4) Monitor authentication logs for unusual patterns such as repeated failed login attempts or logins from suspicious IP addresses, and trigger alerts or account lockouts accordingly. 5) Segment FLIP infrastructure within the network to limit lateral movement if an account is compromised. 6) Educate users about phishing and credential hygiene to reduce the risk of credential theft. 7) Stay updated with londonaicentre announcements for patches or security updates and apply them promptly. 8) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block brute-force attack signatures. These measures collectively reduce the attack surface and improve resilience against exploitation until an official fix is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-24T15:10:05.680Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6ec5f3c064ed76ff25045

Added to database: 3/27/2026, 8:45:19 PM

Last enriched: 3/27/2026, 9:00:41 PM

Last updated: 3/27/2026, 11:02:21 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses