Description

Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account.

INFO

Published Date :

2026-03-27T14:14:01.871Z

Last Modified :

2026-03-27T14:36:04.188Z

Source :

BlackDuck
AFFECTED PRODUCTS

The following products are affected by CVE-2026-1496 vulnerability.

Vendors Products
Black Duck
  • Coverity

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability