CVE-2026-6272
Severity CVSS v4.0:
HIGH
Type:
CWE-306
Missing Authentication for Critical Function
Publication date:
24/04/2026
Last modified:
24/04/2026
Description
A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest.<br />
<br />
1. Obtain any valid token with only read scope.<br />
2. Connect to the normal production gRPC API (kuksa.val.v2).<br />
3. Open OpenProviderStream.<br />
4. Send ProvideSignalRequest for a target signal ID.<br />
5. Wait for the broker to forward GetProviderValueRequest.<br />
6. Reply with attacker-controlled GetProviderValueResponse.<br />
7. Other clients performing GetValue / GetValues for that signal receive forged data.
Impact
Base Score 4.0
8.50
Severity 4.0
HIGH



