๐Ÿ” CVE Alert

CVE-2026-1530

HIGH 8.1

Fog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate validation

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
1th

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communications between Satellite and OpenShift, resulting in information disclosure and data integrity compromise.

CWE CWE-295
Vendor red hat
Product red hat satellite 6.16 for rhel 8
Published Feb 2, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat satellite 6.16 for rhel 8

Be the first to know when new high vulnerabilities affecting red hat red hat satellite 6.16 for rhel 8 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Red Hat / Red Hat Satellite 6.16 for RHEL 8
All versions affected
Red Hat / Red Hat Satellite 6.16 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6.17 for RHEL 9
All versions affected
Red Hat / Red Hat Satellite 6
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2026:5970 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:5971 access.redhat.com: https://access.redhat.com/security/cve/CVE-2026-1530 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2433784

Credits

This issue was discovered by Evgeni Golov (Red Hat).