Description
Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account.
INFO
Published Date :
2026-03-27T14:14:01.871Z
Last Modified :
2026-03-27T14:36:04.188Z
Source :
BlackDuck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-1496 vulnerability.
| Vendors | Products |
|---|---|
| Black Duck |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1496.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability