Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Customers are recommended to upgrade to one of the following Coverity patched versions at their earliest availability or deploy documented mitigations. Patched versions: * 2025.12.1 * 2025.12.0A * 2025.9.2A * 2025.9.0A * 2025.6.2A * 2025.6.0A * 2025.3.1A * 2025.3.0A * 2024.12.1A * 2024.12.0A * 2024.9.1A * 2024.9.0A Full Installers: * 2025.12.1 * 2025.9.3 * 2025.6.4 * 2025.3.2 * 2024.12.2
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account. | |
| Title | Coverity CLI Authentication Bypass | |
| First Time appeared |
Black Duck
Black Duck coverity |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:black_duck:coverity:*:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.12.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.12.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.12.2:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.3.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.3.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.3.2a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.6.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.6.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.9.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2024.9.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.12.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.12.1:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.3.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.3.1a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.3.2:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.6.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.6.2a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.6.4:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.9.0a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.9.2a:*:*:*:*:*:*:* cpe:2.3:a:black_duck:coverity:2025.9.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Black Duck
Black Duck coverity |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: BlackDuck
Published:
Updated: 2026-03-27T14:36:04.188Z
Reserved: 2026-01-27T15:53:39.147Z
Link: CVE-2026-1496
Updated: 2026-03-27T14:35:20.215Z
Status : Awaiting Analysis
Published: 2026-03-27T15:16:48.053
Modified: 2026-03-30T13:26:29.793
Link: CVE-2026-1496
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:01:49Z