Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account. | |
| Title | Coverity CLI Authentication Bypass | |
| First Time appeared |
Black Duck
Black Duck coverity |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:black_duck:coverity:*:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.12.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.12.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.12.2:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.3.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.3.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.3.2a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.6.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.6.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.9.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.9.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.12.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.12.1:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.3.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.3.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.3.2:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.6.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.6.2a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.6.4:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.9.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.9.2a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.9.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Black Duck
Black Duck coverity |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: BlackDuck
Published:
Updated: 2026-03-27T14:36:04.188Z
Reserved: 2026-01-27T15:53:39.147Z
Link: CVE-2026-1496
Updated: 2026-03-27T14:35:20.215Z
Status : Received
Published: 2026-03-27T15:16:48.053
Modified: 2026-03-27T15:16:48.053
Link: CVE-2026-1496
No data.
OpenCVE Enrichment
No data.