<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-33540 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33540/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 15:17:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33540/feed.xml" rel="self" type="application/rss+xml"/><item><title>Distribution Toolkit Authentication Redirection Vulnerability (CVE-2026-33540)</title><link>https://feed.craftedsignal.io/briefs/2026-04-distribution-auth-redirect/</link><pubDate>Mon, 06 Apr 2026 15:17:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-distribution-auth-redirect/</guid><description>A vulnerability in the distribution toolkit prior to 3.1.0 allows a malicious upstream registry or man-in-the-middle attacker to redirect authentication requests, potentially exposing upstream credentials.</description><content:encoded><![CDATA[<p>The distribution toolkit, used for managing container content, is vulnerable to an authentication redirection attack in versions prior to 3.1.0 when operating in pull-through cache mode. The vulnerability, identified as CVE-2026-33540, stems from the toolkit&rsquo;s method of discovering token authentication endpoints. It parses WWW-Authenticate challenges from upstream registries without properly validating the realm URL against the upstream registry host. This allows an attacker controlling the upstream registry or positioned as a Man-in-the-Middle to redirect authentication requests to an attacker-controlled realm URL. This results in distribution sending the configured upstream credentials via basic authentication to the malicious URL. Organizations using affected versions of the distribution toolkit are vulnerable to credential compromise if the toolkit interacts with a malicious or compromised upstream registry. Upgrading to version 3.1.0 or later resolves this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains control of or MitM position to an upstream registry server used by the distribution toolkit.</li>
<li>Distribution toolkit attempts to pull an image from the upstream registry.</li>
<li>Attacker&rsquo;s registry responds with a WWW-Authenticate header, specifying a Bearer authentication scheme and an attacker-controlled realm URL.</li>
<li>The distribution toolkit, vulnerable to CVE-2026-33540, parses the WWW-Authenticate header but fails to validate the realm URL against the legitimate upstream registry.</li>
<li>The distribution toolkit initiates a basic authentication request to the attacker-controlled realm URL, sending the configured upstream credentials (username and password).</li>
<li>The attacker captures the credentials sent via basic authentication.</li>
<li>Attacker uses the compromised credentials to gain unauthorized access to the legitimate upstream registry.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33540 allows an attacker to steal credentials used by the distribution toolkit to authenticate to an upstream registry. This can lead to unauthorized access to container images stored in the upstream registry, potentially resulting in supply chain attacks, data breaches, or the deployment of malicious container images. The severity of the impact depends on the permissions associated with the compromised credentials and the sensitivity of the data stored in the upstream registry.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the distribution toolkit to version 3.1.0 or later to remediate CVE-2026-33540.</li>
<li>Implement network monitoring to detect basic authentication attempts originating from the distribution toolkit to unusual or unexpected destinations (see rule: &ldquo;Detect Basic Authentication to Non-Standard Ports&rdquo;).</li>
<li>Monitor network traffic for connections to unusual or suspicious realm URLs returned in WWW-Authenticate headers from container registries (see rule: &ldquo;Detect Authentication Redirection&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-33540</category><category>authentication</category><category>redirection</category><category>container</category></item></channel></rss>