CVE-2026-43001: CWE-863 Incorrect Authorization in OpenStack Keystone
CVE-2026-43001 is a high-severity authorization vulnerability in OpenStack Keystone versions 13 through 29. It allows an attacker with an unrestricted application credential for one project to create EC2 credentials for a different project. This leads to issuance of Keystone tokens scoped to the unintended project, enabling cross-project lateral movement within the attacker's role permissions. The vulnerability affects the POST /v3/credentials endpoint, which fails to validate that the caller-supplied project_id matches the authenticating credential's project. A patch is available, and since Keystone is a cloud service, the vendor typically manages remediation server-side.
AI Analysis
Technical Summary
OpenStack Keystone versions 13 through 29 contain an authorization flaw (CWE-863) in the POST /v3/credentials API endpoint. The service does not verify that the project_id provided when creating an EC2-type credential matches the project associated with the authenticating application credential. This allows an attacker holding an unrestricted application credential for project A to create EC2 credentials for project B. Subsequently, exchanging these credentials via /v3/ec2tokens issues a Keystone token scoped to project B but still linked to the original application credential ID. This enables cross-project lateral movement within the attacker's role scope. The CVSS 3.1 score is 7.9 (high severity), reflecting network attack vector, high privileges required, no user interaction, scope change, and high confidentiality and integrity impact with low availability impact. A patch is available, and as Keystone is a cloud service, remediation is typically managed by the vendor.
Potential Impact
Successful exploitation allows an attacker with an unrestricted application credential in one project to create EC2 credentials for another project and obtain tokens scoped to that other project. This results in unauthorized cross-project access and lateral movement within the attacker's role permissions, potentially exposing sensitive data or operations across projects. The impact includes high confidentiality and integrity compromise with limited availability impact.
Mitigation Recommendations
A patch is available for this vulnerability. Since OpenStack Keystone is a cloud service, the vendor typically manages remediation server-side. Users should verify with the vendor advisory that their Keystone deployment has been updated to address this issue. Until patched, restricting application credential privileges and monitoring for unusual credential creation activity may help reduce risk. Patch status is confirmed as available, so applying the official fix is the recommended mitigation.
CVE-2026-43001: CWE-863 Incorrect Authorization in OpenStack Keystone
Description
CVE-2026-43001 is a high-severity authorization vulnerability in OpenStack Keystone versions 13 through 29. It allows an attacker with an unrestricted application credential for one project to create EC2 credentials for a different project. This leads to issuance of Keystone tokens scoped to the unintended project, enabling cross-project lateral movement within the attacker's role permissions. The vulnerability affects the POST /v3/credentials endpoint, which fails to validate that the caller-supplied project_id matches the authenticating credential's project. A patch is available, and since Keystone is a cloud service, the vendor typically manages remediation server-side.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
OpenStack Keystone versions 13 through 29 contain an authorization flaw (CWE-863) in the POST /v3/credentials API endpoint. The service does not verify that the project_id provided when creating an EC2-type credential matches the project associated with the authenticating application credential. This allows an attacker holding an unrestricted application credential for project A to create EC2 credentials for project B. Subsequently, exchanging these credentials via /v3/ec2tokens issues a Keystone token scoped to project B but still linked to the original application credential ID. This enables cross-project lateral movement within the attacker's role scope. The CVSS 3.1 score is 7.9 (high severity), reflecting network attack vector, high privileges required, no user interaction, scope change, and high confidentiality and integrity impact with low availability impact. A patch is available, and as Keystone is a cloud service, remediation is typically managed by the vendor.
Potential Impact
Successful exploitation allows an attacker with an unrestricted application credential in one project to create EC2 credentials for another project and obtain tokens scoped to that other project. This results in unauthorized cross-project access and lateral movement within the attacker's role permissions, potentially exposing sensitive data or operations across projects. The impact includes high confidentiality and integrity compromise with limited availability impact.
Mitigation Recommendations
A patch is available for this vulnerability. Since OpenStack Keystone is a cloud service, the vendor typically manages remediation server-side. Users should verify with the vendor advisory that their Keystone deployment has been updated to address this issue. Until patched, restricting application credential privileges and monitoring for unusual credential creation activity may help reduce risk. Patch status is confirmed as available, so applying the official fix is the recommended mitigation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-05-01T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
- Is Cloud Service
- true
Threat ID: 69f46607cbff5d861092e800
Added to database: 5/1/2026, 8:36:23 AM
Last enriched: 5/1/2026, 8:51:28 AM
Last updated: 5/1/2026, 10:59:15 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.