Unrated severityNVD Advisory· Published Mar 27, 2026· Updated Mar 27, 2026
Coverity CLI Authentication Bypass
CVE-2026-1496
Description
Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account.
Affected products
1- Range: 2024.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- community.blackduck.com/s/article/Black-Duck-Security-Advisory-CVE-2026-1496mitrevendor-advisory
- community.blackduck.com/s/article/Instructions-on-how-to-block-token-endpoint-for-Coverity-Connectmitrevendor-advisorymitigation
- community.blackduck.com/s/article/WAF-IDS-IPS-Mitigation-Guidancemitrevendor-advisorymitigation
News mentions
1- Siemens SIMATICCISA Alerts