This issue affects Symmetric Key Agreement Platform: before 26.03.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.cvcn.gov.it/cvcn/cve/CVE-2026-33585 |
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arqit
Arqit symmetric Key Agreement Platform |
|
| Vendors & Products |
Arqit
Arqit symmetric Key Agreement Platform |
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper management of the idle timeout parameter in the Keycloak interface of the Arqit SKA-Platform enables an attacker to impersonate an authenticated tenant user via an unexpired browser session. This issue affects Symmetric Key Agreement Platform: before 26.03. | |
| Title | Arqit SKA-Platform Improper Handling of Parameters Vulnerability | |
| Weaknesses | CWE-233 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ENISA
Published:
Updated: 2026-05-13T19:31:17.058Z
Reserved: 2026-03-23T12:53:47.473Z
Link: CVE-2026-33585
Updated: 2026-05-13T19:31:12.596Z
Status : Deferred
Published: 2026-05-13T19:17:07.330
Modified: 2026-05-14T17:19:49.973
Link: CVE-2026-33585
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:54Z