CVE-2026-1496 PUBLISHED

Coverity CLI Authentication Bypass

Assigner: BlackDuck
Reserved: 27.01.2026 Published: 27.03.2026 Updated: 27.03.2026

Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Black Duck
Product Coverity
Versions Default: unaffected
  • affected from 2024.3.0 to 2025.12.0 (excl.)
  • Version 2024.3.0A is unaffected
  • Version 2024.3.1A is unaffected
  • Version 2024.3.2A is unaffected
  • Version 2024.6.0A is unaffected
  • Version 2024.6.1A is unaffected
  • Version 2024.9.0A is unaffected
  • Version 2024.9.1A is unaffected
  • Version 2024.12.0A is unaffected
  • Version 2024.12.1A is unaffected
  • Version 2024.12.2 is unaffected
  • Version 2025.3.0A is unaffected
  • Version 2025.3.1A is unaffected
  • Version 2025.3.2 is unaffected
  • Version 2025.6.0A is unaffected
  • Version 2025.6.2A is unaffected
  • Version 2025.6.4 is unaffected
  • Version 2025.9.0A is unaffected
  • Version 2025.9.2A is unaffected
  • Version 2025.9.3 is unaffected
  • Version 2025.12.0A is unaffected
  • Version 2025.12.1 is unaffected

Solutions

Customers are recommended to upgrade to one of the following Coverity patched versions at their earliest availability or deploy documented mitigations.

Patched versions:

  • 2025.12.1

  • 2025.12.0A

  • 2025.9.2A
  • 2025.9.0A
  • 2025.6.2A
  • 2025.6.0A
  • 2025.3.1A
  • 2025.3.0A
  • 2024.12.1A
  • 2024.12.0A
  • 2024.9.1A
  • 2024.9.0A

Full Installers:

  • 2025.12.1
  • 2025.9.3
  • 2025.6.4
  • 2025.3.2
  • 2024.12.2

Credits

  • Huong Kieu from Cenobe finder

References

Problem Types

  • CWE-639 Authorization bypass through User-Controlled key CWE

Impacts

  • CAPEC-384 Application API Message Manipulation via Man-in-the-Middle