Логотип exploitDog
bind:CVE-2026-2733
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-2733

Количество 4

Количество 4

redhat логотип

CVE-2026-2733

около 1 месяца назад

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.

CVSS3: 3.8
EPSS: Низкий
nvd логотип

CVE-2026-2733

около 1 месяца назад

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.

CVSS3: 3.8
EPSS: Низкий
debian логотип

CVE-2026-2733

около 1 месяца назад

A flaw was identified in the Docker v2 authentication endpoint of Keyc ...

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-fjf4-6f34-w64q

около 1 месяца назад

Keycloak: Missing Check on Disabled Client for Docker Registry Protocol

CVSS3: 3.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-2733

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.

CVSS3: 3.8
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-2733

A flaw was identified in the Docker v2 authentication endpoint of Keycloak, where tokens continue to be issued even after a Docker registry client has been administratively disabled. This means that turning the client “Enabled” setting to OFF does not fully prevent access. As a result, previously valid credentials can still be used to obtain authentication tokens. This weakens administrative controls and could allow unintended access to container registry resources.

CVSS3: 3.8
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-2733

A flaw was identified in the Docker v2 authentication endpoint of Keyc ...

CVSS3: 3.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-fjf4-6f34-w64q

Keycloak: Missing Check on Disabled Client for Docker Registry Protocol

CVSS3: 3.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу