OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple API endpoints. This unconditionally authorizes any request carrying a valid Keystone token regardless of roles, project membership, or scope. An authenticated user with zero role assignments can complete various actions such as reprogramming FPGA bitstreams on arbitrary compute nodes via agent RPC.
Metrics
Affected Vendors & Products
References
History
Fri, 08 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unrestricted API Access Enables Unauthorized FPGA Reprogramming in OpenStack Cyborg |
Thu, 07 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple API endpoints. This unconditionally authorizes any request carrying a valid Keystone token regardless of roles, project membership, or scope. An authenticated user with zero role assignments can complete various actions such as reprogramming FPGA bitstreams on arbitrary compute nodes via agent RPC. | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-07T00:00:00.000Z
Updated: 2026-05-07T21:57:41.910Z
Reserved: 2026-04-10T00:00:00.000Z
Link: CVE-2026-40213
No data.
Status : Received
Published: 2026-05-07T22:16:34.910
Modified: 2026-05-07T22:16:34.910
Link: CVE-2026-40213
No data.
ReportizFlow