๐Ÿ” CVE Alert

CVE-2026-1842

UNKNOWN 0.0

HyperCloud Improper Refresh Token Validation and Access Token Invalidation Allows Long-Term Unauthorized Access

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

HyperCloud versions 2.3.5 through 2.6.8 improperly allowed refresh tokens to be used directly for resource access and failed to invalidate previously issued access tokens when a refresh token was used. Because refresh tokens have a significantly longer lifetime (default one year), an authenticated client could use a refresh token in place of an access token to maintain long-term access without token rotation. Additionally, old access tokens remained valid after refresh, enabling concurrent or extended use beyond intended session boundaries. This vulnerability could allow prolonged unauthorized access if a token is disclosed.

CWE CWE-613
Vendor softiron
Product hypercloud
Published Feb 20, 2026
Last Updated Feb 20, 2026
Stay Ahead of the Next One

Get instant alerts for softiron hypercloud

Be the first to know when new unknown vulnerabilities affecting softiron hypercloud are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

SoftIron / HyperCloud
2.3.5 < 2.6.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
advisories.softiron.cloud: https://advisories.softiron.cloud/