Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-4631 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Cockpit's remote login feature passes user-supplied hostnames/usernames to the SSH client **without validation**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-78 (OS Command Injection). <br>πŸ” **Flaw**: The vulnerability stems from **unvalidated/un-sanitized input** during the authentication flow.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Red Hat. <br>πŸ“¦ **Product**: Red Hat Enterprise Linux 10 (Cockpit component). <br>⚠️ **Scope**: Any instance of Cockpit with network access to the web service is potentially affected.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: **Full Code Execution**. <br>πŸ“‚ **Data**: Complete compromise of the Cockpit host. <br>πŸ”“ **Access**: Achieved **without valid credentials**.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>🌐 **Auth**: **No authentication required**. <br>βš™οΈ **Config**: Only requires **network access** to the Cockpit web service. A single crafted HTTP request is sufficient.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp**: **Yes**. <br>πŸ”— **PoC**: Available via ProjectDiscovery Nuclei templates (`CVE-2026-4631.yaml`).…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for open Cockpit web interfaces. <br>πŸ§ͺ **Testing**: Use Nuclei templates to test the login endpoint for command injection.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **Yes**. <br>πŸ“‹ **Advisories**: Red Hat issued multiple errata (RHSA-2026:7381, 7382, 7383, 7384). <br>βœ… **Action**: Update Cockpit to the patched version via Red Hat repositories.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **restrict network access** to the Cockpit web service. <br>πŸ”’ **Mitigation**: Place behind a WAF or firewall that blocks malicious SSH option injections in HTTP requests.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>πŸ“ˆ **Priority**: **P1**. <br>βš–οΈ **Reason**: CVSS 9.1 (High). No auth required + RCE + Easy exploitation = Immediate patching recommended.