Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2026/sa2026-03 |
|
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
ssvc
|
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Octopus
Octopus octopus Server |
|
| Vendors & Products |
Octopus
Octopus octopus Server |
Tue, 17 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability. | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2026-03-17T13:20:24.029Z
Reserved: 2026-02-26T00:26:01.068Z
Link: CVE-2026-3237
Updated: 2026-03-17T13:20:14.956Z
Status : Awaiting Analysis
Published: 2026-03-17T07:16:03.610
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-3237
No data.
OpenCVE Enrichment
Updated: 2026-03-17T09:51:54Z