CVE-2026-5119: Cleartext Transmission of Sensitive Information in Red Hat Red Hat Enterprise Linux 10
CVE-2026-5119 is a medium severity vulnerability affecting Red Hat Enterprise Linux 10, specifically in the libsoup library. When HTTPS tunnels are established through an HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. This flaw allows a network-positioned attacker or malicious proxy to intercept these cookies, potentially leading to session hijacking or user impersonation. Exploitation requires user interaction and has a high impact on confidentiality but limited impact on integrity and no impact on availability. No known exploits are currently reported in the wild. Organizations using Red Hat Enterprise Linux 10 with HTTP proxies should prioritize patching and consider network-level protections to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-5119 is a vulnerability identified in the libsoup library used by Red Hat Enterprise Linux 10. The issue arises during the establishment of HTTPS tunnels via a configured HTTP proxy. Normally, HTTPS tunnels use the HTTP CONNECT method to create a secure channel through the proxy, after which encrypted communication occurs. However, due to this flaw, sensitive session cookies are included in cleartext within the initial HTTP CONNECT request before the secure tunnel is fully established. This exposure allows an attacker positioned on the network path or a malicious HTTP proxy to intercept these cookies. Since session cookies often contain authentication tokens, their interception can lead to session hijacking or user impersonation attacks. The vulnerability has a CVSS v3.1 base score of 5.9, reflecting medium severity, with a vector indicating network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, high confidentiality impact, low integrity impact, and no availability impact. No public exploits are known at this time, but the vulnerability poses a significant risk in environments where HTTP proxies are used to tunnel HTTPS traffic, especially in enterprise settings relying on Red Hat Enterprise Linux 10. The flaw highlights a critical design oversight in how sensitive data is handled during the proxy tunnel setup phase.
Potential Impact
The primary impact of CVE-2026-5119 is the potential compromise of session confidentiality. Intercepted session cookies can allow attackers to hijack user sessions, leading to unauthorized access to sensitive systems or data. This can result in user impersonation, data leakage, and potential lateral movement within an organization’s network. Although the integrity and availability impacts are low or none, the confidentiality breach alone can have severe consequences, especially in environments handling sensitive or regulated data. Organizations using HTTP proxies to tunnel HTTPS traffic on Red Hat Enterprise Linux 10 are at risk, particularly if attackers have network access or control over proxy infrastructure. The requirement for user interaction and high attack complexity somewhat limits exploitation, but targeted attacks against high-value users or systems remain a concern. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is widely known.
Mitigation Recommendations
To mitigate CVE-2026-5119, organizations should apply any available patches or updates from Red Hat addressing the libsoup vulnerability as soon as they are released. In the absence of patches, consider disabling or avoiding the use of HTTP proxies for HTTPS tunneling where possible. Network administrators should monitor and restrict proxy configurations to trusted devices only and implement network segmentation to limit attacker access to proxy traffic. Employing encrypted proxy protocols or VPNs can reduce exposure of sensitive data during proxy communication. Additionally, enforcing multi-factor authentication (MFA) can mitigate the impact of session hijacking by requiring additional verification beyond stolen cookies. Regularly auditing proxy logs for unusual CONNECT requests and monitoring for anomalous session activity can help detect exploitation attempts. Educating users about the risks of interacting with untrusted networks or proxies can also reduce the likelihood of successful attacks. Finally, consider deploying endpoint detection and response (EDR) solutions to identify suspicious session hijacking behaviors.
Affected Countries
United States, Germany, United Kingdom, India, Japan, Canada, Australia, France, South Korea, Brazil
CVE-2026-5119: Cleartext Transmission of Sensitive Information in Red Hat Red Hat Enterprise Linux 10
Description
CVE-2026-5119 is a medium severity vulnerability affecting Red Hat Enterprise Linux 10, specifically in the libsoup library. When HTTPS tunnels are established through an HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. This flaw allows a network-positioned attacker or malicious proxy to intercept these cookies, potentially leading to session hijacking or user impersonation. Exploitation requires user interaction and has a high impact on confidentiality but limited impact on integrity and no impact on availability. No known exploits are currently reported in the wild. Organizations using Red Hat Enterprise Linux 10 with HTTP proxies should prioritize patching and consider network-level protections to mitigate risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5119 is a vulnerability identified in the libsoup library used by Red Hat Enterprise Linux 10. The issue arises during the establishment of HTTPS tunnels via a configured HTTP proxy. Normally, HTTPS tunnels use the HTTP CONNECT method to create a secure channel through the proxy, after which encrypted communication occurs. However, due to this flaw, sensitive session cookies are included in cleartext within the initial HTTP CONNECT request before the secure tunnel is fully established. This exposure allows an attacker positioned on the network path or a malicious HTTP proxy to intercept these cookies. Since session cookies often contain authentication tokens, their interception can lead to session hijacking or user impersonation attacks. The vulnerability has a CVSS v3.1 base score of 5.9, reflecting medium severity, with a vector indicating network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, high confidentiality impact, low integrity impact, and no availability impact. No public exploits are known at this time, but the vulnerability poses a significant risk in environments where HTTP proxies are used to tunnel HTTPS traffic, especially in enterprise settings relying on Red Hat Enterprise Linux 10. The flaw highlights a critical design oversight in how sensitive data is handled during the proxy tunnel setup phase.
Potential Impact
The primary impact of CVE-2026-5119 is the potential compromise of session confidentiality. Intercepted session cookies can allow attackers to hijack user sessions, leading to unauthorized access to sensitive systems or data. This can result in user impersonation, data leakage, and potential lateral movement within an organization’s network. Although the integrity and availability impacts are low or none, the confidentiality breach alone can have severe consequences, especially in environments handling sensitive or regulated data. Organizations using HTTP proxies to tunnel HTTPS traffic on Red Hat Enterprise Linux 10 are at risk, particularly if attackers have network access or control over proxy infrastructure. The requirement for user interaction and high attack complexity somewhat limits exploitation, but targeted attacks against high-value users or systems remain a concern. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is widely known.
Mitigation Recommendations
To mitigate CVE-2026-5119, organizations should apply any available patches or updates from Red Hat addressing the libsoup vulnerability as soon as they are released. In the absence of patches, consider disabling or avoiding the use of HTTP proxies for HTTPS tunneling where possible. Network administrators should monitor and restrict proxy configurations to trusted devices only and implement network segmentation to limit attacker access to proxy traffic. Employing encrypted proxy protocols or VPNs can reduce exposure of sensitive data during proxy communication. Additionally, enforcing multi-factor authentication (MFA) can mitigate the impact of session hijacking by requiring additional verification beyond stolen cookies. Regularly auditing proxy logs for unusual CONNECT requests and monitoring for anomalous session activity can help detect exploitation attempts. Educating users about the risks of interacting with untrusted networks or proxies can also reduce the likelihood of successful attacks. Finally, consider deploying endpoint detection and response (EDR) solutions to identify suspicious session hijacking behaviors.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2026-03-30T05:13:41.920Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ca16d5e6bfc5ba1dd8ea87
Added to database: 3/30/2026, 6:23:17 AM
Last enriched: 3/30/2026, 6:38:20 AM
Last updated: 3/30/2026, 8:47:06 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.