Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 07 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hkuds:openharness:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hkuds
Hkuds openharness |
|
| Vendors & Products |
Hkuds
Hkuds openharness |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access through default-enabled read-only tools. | |
| Title | HKUDS OpenHarness Insecure Default Remote Channel Allowlist | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-22T13:50:01.661Z
Reserved: 2026-04-21T20:23:55.847Z
Link: CVE-2026-6823
Updated: 2026-04-22T13:49:57.025Z
Status : Analyzed
Published: 2026-04-21T21:16:48.827
Modified: 2026-05-07T20:29:09.890
Link: CVE-2026-6823
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:45:07Z