Skip to content
CVSS 7.9 · HIGH

CVE-2026-43001

An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attacker holding an unrestricted application credential for project A to create an EC2 credential targeting project B; a subsequent /v3/ec2tokens exchange would then issue a Keystone token scoped to project B while still carrying the original app_cred_id, enabling cross-project lateral movement within the credential owner's role footprint.

Ver en NVD

Análisis

OpenStack Keystone versions 13 through 29 contain a flaw that allows cross-project lateral movement. An attacker with an application credential for one project can create EC2 credentials for a different project, effectively breaking tenant isolation. Cloud administrators should patch Keystone immediately to maintain proper authorization boundaries.

Severidad

Puntaje: 7.9(HIGH)
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
AV: NETWORK
AC: HIGH
PR: HIGH
UI: NONE
S: CHANGED
C: HIGH
I: HIGH
A: LOW
Tipo de falla (CWE): CWE-863

EPSS

Probabilidad de explotación (próx. 30 días): 0.0001 (0.0%)
Percentil: 1.6%
EPSS: 2026-05-06

Afecta

openstack:keystone

Descripción técnica

An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attacker holding an unrestricted application credential for project A to create an EC2 credential targeting project B; a subsequent /v3/ec2tokens exchange would then issue a Keystone token scoped to project B while still carrying the original app_cred_id, enabling cross-project lateral movement within the credential owner's role footprint.

Publicada: 1/5/2026, 9:16:17
Última modificación: 4/5/2026, 18:25:50

Referencias

InicioEventosBlogRecursosEquipo