Home

Description

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of intercepting network traffic between Satellite and OpenShift, to perform a Man-in-the-Middle (MITM) attack. Such an attack could lead to the disclosure or alteration of sensitive information.

PUBLISHED Reserved 2026-01-28 | Published 2026-02-02 | Updated 2026-02-02 | Assigner redhat




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Certificate Validation

Product status

Default status
affected

Default status
affected

Timeline

2026-01-28:Reported to Red Hat.
2026-01-28:Made public.

Credits

This issue was discovered by Evgeni Golov (Red Hat).

References

access.redhat.com/security/cve/CVE-2026-1531 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2433786 (RHBZ#2433786) issue-tracking

cve.org (CVE-2026-1531)

nvd.nist.gov (CVE-2026-1531)

Download JSON