Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:himmelblau-idm:himmelblau:*:*:*:*:*:*:*:* |
Thu, 12 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Himmelblau-idm
Himmelblau-idm himmelblau |
|
| Vendors & Products |
Himmelblau-idm
Himmelblau-idm himmelblau |
Wed, 11 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentication is not tenant-scoped. In this mode, Himmelblau can accept authentication attempts for arbitrary Entra ID domains by dynamically registering providers at runtime. This behavior is intended for initial/local bootstrap scenarios, but it can create risk in remote authentication environments. This vulnerability is fixed in 3.1.0. | |
| Title | Himmelblau unset domain configuration can allow any-tenant authentication at first login for remote deployments | |
| Weaknesses | CWE-1188 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T20:00:41.000Z
Reserved: 2026-03-10T15:40:10.480Z
Link: CVE-2026-31957
Updated: 2026-03-12T20:00:37.797Z
Status : Analyzed
Published: 2026-03-11T20:16:16.447
Modified: 2026-03-16T19:39:37.913
Link: CVE-2026-31957
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:29:18Z