CVE-2026-6272
Gravedad CVSS v4.0:
ALTA
Tipo:
CWE-306
Ausencia de autenticación para una función crítica
Fecha de publicación:
24/04/2026
Última modificación:
24/04/2026
Descripción
*** Pendiente de traducción *** A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest.<br />
<br />
1. Obtain any valid token with only read scope.<br />
2. Connect to the normal production gRPC API (kuksa.val.v2).<br />
3. Open OpenProviderStream.<br />
4. Send ProvideSignalRequest for a target signal ID.<br />
5. Wait for the broker to forward GetProviderValueRequest.<br />
6. Reply with attacker-controlled GetProviderValueResponse.<br />
7. Other clients performing GetValue / GetValues for that signal receive forged data.
Impacto
Puntuación base 4.0
8.50
Gravedad 4.0
ALTA



