Home

Description

A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest. 1. Obtain any valid token with only read scope. 2. Connect to the normal production gRPC API (kuksa.val.v2). 3. Open OpenProviderStream. 4. Send ProvideSignalRequest for a target signal ID. 5. Wait for the broker to forward GetProviderValueRequest. 6. Reply with attacker-controlled GetProviderValueResponse. 7. Other clients performing GetValue / GetValues for that signal receive forged data.

PUBLISHED Reserved 2026-04-14 | Published 2026-04-24 | Updated 2026-04-24 | Assigner eclipse




HIGH: 8.5CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

Default status
unaffected

0.5.0 (semver)
affected

Credits

Ciwan Öztopal finder

References

gitlab.eclipse.org/security/cve-assignment/-/issues/98 exploit

gitlab.eclipse.org/security/cve-assignment/-/issues/98

cve.org (CVE-2026-6272)

nvd.nist.gov (CVE-2026-6272)

Download JSON