{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4740","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2026-03-24T03:19:46.998Z","datePublished":"2026-04-07T14:30:36.396Z","dateUpdated":"2026-04-09T14:40:43.580Z"},"containers":{"cna":{"title":"Rhacm: open cluster management (ocm): cross-cluster privilege escalation via improper kubernetes client certificate renewal validation","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This enables cross-cluster privilege escalation and may allow an attacker to gain control over other managed clusters, including the hub cluster."}],"affected":[{"vendor":"Red Hat","product":"Multicluster Engine for Kubernetes","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"multicluster-engine/registration-operator-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:multicluster_engine"]},{"vendor":"Red Hat","product":"Multicluster Engine for Kubernetes","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"multicluster-engine/registration-rhel9","defaultStatus":"affected","cpes":["cpe:/a:redhat:multicluster_engine"]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2026-4740","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://blog.arfevrier.fr/open-cluster-management-cross-cluster-escape/"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450590","name":"RHBZ#2450590","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2026-04-07T14:00:35.240Z","problemTypes":[{"descriptions":[{"cweId":"CWE-295","description":"Improper Certificate Validation","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-295: Improper Certificate Validation","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability."}],"timeline":[{"lang":"en","time":"2026-03-24T03:18:24.150Z","value":"Reported to Red Hat."},{"lang":"en","time":"2026-04-07T14:00:35.240Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Arnaud FEVRIER (Orange) for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-04-07T14:30:36.396Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-09T14:40:37.454585Z","id":"CVE-2026-4740","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-09T14:40:43.580Z"}}]}}