CVE-2026-6272
HIGHEclipse KUKSA - Databroker <0.6.0 - Privilege Escalation
Title source: llmDescription
A client holding only a read JWT scope can still register itself as a signal provider through the production kuksa.val.v2 OpenProviderStream API by sending ProvideSignalRequest. 1. Obtain any valid token with only read scope. 2. Connect to the normal production gRPC API (kuksa.val.v2). 3. Open OpenProviderStream. 4. Send ProvideSignalRequest for a target signal ID. 5. Wait for the broker to forward GetProviderValueRequest. 6. Reply with attacker-controlled GetProviderValueResponse. 7. Other clients performing GetValue / GetValues for that signal receive forged data.
Scores
CVSS v4
8.5
EPSS
0.0004
EPSS Percentile
13.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-306
Status
published
Products (1)
Eclipse Foundation/Eclipse KUKSA - Databroker
0.5.0 - 0.6.0
Published
Apr 24, 2026
Tracked Since
Apr 24, 2026