EUVD-2026-21278

| CVE-2026-33551 LOW
2026-04-10 mitre
3.5
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

4
Patch Released
Apr 10, 2026 - 08:30 nvd
Patch available
Analysis Generated
Apr 10, 2026 - 02:45 vuln.today
EUVD ID Assigned
Apr 10, 2026 - 02:45 euvd
EUVD-2026-21278
CVE Published
Apr 10, 2026 - 00:00 nvd
LOW 3.5

Description

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role may obtain an EC2/S3 credential that carries the full set of the parent user's S3 permissions, effectively bypassing the role restrictions imposed on the application credential. Only deployments that use restricted application credentials in combination with the EC2/S3 compatibility API (swift3 / s3api) are affected.

Analysis

OpenStack Keystone 14 through 29.x allows authenticated users with restricted application credentials to create EC2 credentials that inherit the parent user's full S3 permissions, bypassing role restrictions. This privilege escalation affects only deployments combining restricted application credentials with the EC2/S3 compatibility API (swift3/s3api), and requires valid authentication credentials and moderate attack complexity to exploit.

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

18
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +18
POC: 0

Vendor Status

Ubuntu

Priority: Medium
keystone
Release Status Version
xenial needs-triage -
bionic needs-triage -
focal needs-triage -
jammy needs-triage -
noble needs-triage -
questing needs-triage -
upstream needs-triage -

Debian

keystone
Release Status Fixed Version Urgency
bullseye vulnerable 2:18.0.0-3+deb11u1 -
bullseye (security) vulnerable 2:18.1.0-1+deb11u2 -
bookworm, bookworm (security) vulnerable 2:22.0.2-0+deb12u1 -
trixie (security), trixie vulnerable 2:27.0.0-3+deb13u1 -
forky, sid vulnerable 2:29.0.0-1 -
(unstable) fixed (unfixed) -

Share

EUVD-2026-21278 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy