Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account.
History

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account.
Title Coverity CLI Authentication Bypass
First Time appeared Black Duck
Black Duck coverity
Weaknesses CWE-639
CPEs cpe:2.3:a:black_duck:coverity:*:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.12.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.12.1a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.12.2:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.3.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.3.1a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.3.2a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.6.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.6.1a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.9.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2024.9.1a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.12.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.12.1:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.3.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.3.1a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.3.2:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.6.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.6.2a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.6.4:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.9.0a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.9.2a:*:*:*:*:*:*:*
cpe:2.3:a:black_duck:coverity:2025.9.3:*:*:*:*:*:*:*
Vendors & Products Black Duck
Black Duck coverity
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: BlackDuck

Published:

Updated: 2026-03-27T14:36:04.188Z

Reserved: 2026-01-27T15:53:39.147Z

Link: CVE-2026-1496

cve-icon Vulnrichment

Updated: 2026-03-27T14:35:20.215Z

cve-icon NVD

Status : Received

Published: 2026-03-27T15:16:48.053

Modified: 2026-03-27T15:16:48.053

Link: CVE-2026-1496

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.