CVE-2026-33583
Description
Exposure of the QKEY (used as input into the ‘OTA-Quantum’ device registration process) and internal system keys via an unauthenticated and unencrypted HTTP GET method in the Arqit Symmetric Key Agreement Platform.
This issue affects Symmetric Key Agreement Platform: before 26.03.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated HTTP GET on Arqit's Symmetric Key Agreement Platform leaks QKEY and internal system keys, enabling cryptographic compromise.
The Arqit Symmetric Key Agreement Platform (SKA-Platform) exposes a REST API that permits retrieval of cryptographic keys via an unauthenticated and unencrypted HTTP GET method [1]. This vulnerability affects versions 25.09.x and 25.12. The exposed QKEY is used as an input into the 'OTA-Quantum' device registration process, and internal system keys are also accessible from the platform database [1].
An attacker with network access to the SKA-Platform can exploit this by sending a crafted HTTP GET request to the vulnerable endpoint. No authentication or encryption is required, and the attack complexity is high (AC:H) according to the CVSS vector [1]. The attacker must be on the same network segment to reach the service, but once accessed, keys are retrieved in plaintext.
Successful exploitation allows the attacker to obtain the QKEY and internal system keys, which can be used to the complete compromise of the device registration process and internal cryptographic operations. The CVSS v3.1 base score is 8.7 (HIGH) with impacts on confidentiality and integrity (C:H/I:H) [1]. The fixed version is 26.03 [1]. Arqit has released a patch, and users should upgrade immediately.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.