Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4828: CWE-1390 in Devolutions Server

0
High
VulnerabilityCVE-2026-4828cvecve-2026-4828cwe-1390
Published: Wed Apr 01 2026 (04/01/2026, 14:48:53 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Server

Description

Improper authentication in the OAuth login functionality in Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid credentials to bypass multi-factor authentication via a crafted login request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 15:40:22 UTC

Technical Analysis

CVE-2026-4828 identifies a security vulnerability in the OAuth login implementation of Devolutions Server versions 2026.1.11 and earlier. The vulnerability is categorized under CWE-1390, which relates to improper authentication mechanisms. Specifically, the OAuth login flow fails to properly enforce multi-factor authentication (MFA), allowing a remote attacker who already possesses valid user credentials to bypass the MFA requirement by sending a specially crafted login request. This flaw effectively reduces the security posture of the authentication process, as MFA is a critical control designed to prevent unauthorized access even if credentials are compromised. The vulnerability does not require the attacker to have elevated privileges beyond valid user credentials, nor does it require user interaction beyond the crafted request. No CVSS score has been assigned yet, and no public exploits have been reported, but the vulnerability is publicly disclosed and considered published. The absence of patches at the time of disclosure means that affected organizations must rely on compensating controls until a fix is available. Devolutions Server is commonly used for managing remote connections and privileged credentials, making this vulnerability particularly concerning for organizations that depend on it for secure access management. The improper authentication weakness could be exploited to gain unauthorized access to sensitive systems, potentially leading to data breaches, lateral movement within networks, and compromise of critical infrastructure.

Potential Impact

The primary impact of CVE-2026-4828 is the bypass of multi-factor authentication, which significantly weakens the security of user accounts protected by Devolutions Server. Attackers with valid credentials can circumvent MFA, increasing the risk of unauthorized access to privileged accounts and sensitive systems. This can lead to data breaches, unauthorized administrative actions, and potential disruption of business operations. The confidentiality and integrity of organizational data are at risk, as attackers may gain persistent access to critical systems. The availability impact is moderate but could escalate if attackers use the access to deploy ransomware or disrupt services. Organizations worldwide that rely on Devolutions Server for privileged access management face increased exposure, especially if credential theft or phishing attacks are prevalent. The lack of a patch at disclosure time means that the window of exposure could be prolonged, increasing the risk of exploitation. Although no known exploits are currently in the wild, the vulnerability is straightforward to exploit for attackers who have obtained valid credentials, making it a high-risk issue once weaponized.

Mitigation Recommendations

1. Immediately monitor authentication logs for unusual login patterns, especially OAuth login attempts that may indicate crafted requests bypassing MFA. 2. Enforce strict credential hygiene policies, including regular password changes and detection of credential leaks, to reduce the chance of attackers obtaining valid credentials. 3. Implement network-level controls such as IP whitelisting or VPN requirements to limit access to Devolutions Server interfaces. 4. Use additional layers of security such as endpoint detection and response (EDR) to detect anomalous activities post-login. 5. Engage with Devolutions support to obtain timelines for patches and apply updates promptly once available. 6. Consider temporary compensating controls like disabling OAuth login if feasible or enforcing alternative authentication methods until the vulnerability is patched. 7. Educate users about phishing and credential theft risks to reduce the likelihood of credential compromise. 8. Conduct regular penetration testing and vulnerability assessments focused on authentication mechanisms to identify similar weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2026-03-25T14:10:03.751Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd3867e6bfc5ba1ddc2e3c

Added to database: 4/1/2026, 3:23:19 PM

Last enriched: 4/1/2026, 3:40:22 PM

Last updated: 4/4/2026, 8:13:31 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses