CVE-2026-31837
highCVSS v3 Base Score
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score
0.1%
Exploitation probability in 30 days
Top 85% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
None
Availability
None
Published: March 10, 2026 (64 days ago)
Last Modified: March 10, 2026
Vendor: Red Hat
Source: REDHAT
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in Istio. A user of Istio could be impacted if the JSON Web Key Set (JWKS) resolver becomes unavailable or fails to fetch keys. This vulnerability can lead to the exposure of hardcoded default settings, potentially bypassing authentication mechanisms and allowing unauthorized access.
CWE
CWE-1392Affected Products
cert-manager Operator for Red Hat OpenShiftExternalDNS OperatorOpenShift ServerlessOpenShift Service Mesh 2OpenShift Service Mesh 3Red Hat Ansible Automation Platform 2Red Hat Connectivity Link 1Red Hat OpenShift AI (RHOAI)