The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-2092

CVE-2026-2092: Keycloak Auth Bypass Vulnerability

CVE-2026-2092 is an authentication bypass flaw in Keycloak's SAML broker endpoint that allows attackers to inject encrypted assertions for unauthorized access. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: March 20, 2026

CVE-2026-2092 Overview

A security vulnerability has been identified in Keycloak's Security Assertion Markup Language (SAML) broker endpoint. The flaw exists because the endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exploit this weakness by crafting a malicious SAML response, allowing them to inject an encrypted assertion for an arbitrary principal. This can lead to unauthorized access and potential information disclosure in affected Keycloak deployments.

Critical Impact

Attackers with a valid signed SAML assertion can bypass authentication controls and gain unauthorized access by injecting encrypted assertions for arbitrary users, potentially compromising identity federation and single sign-on implementations.

Affected Products

  • Keycloak (specific versions not disclosed in CVE data)
  • Red Hat Single Sign-On (related advisory RHSA-2026:3925)
  • Red Hat Build of Keycloak (related advisories RHSA-2026:3926, RHSA-2026:3947, RHSA-2026:3948)

Discovery Timeline

  • 2026-03-18 - CVE-2026-2092 published to NVD
  • 2026-03-18 - Last updated in NVD database

Technical Details for CVE-2026-2092

Vulnerability Analysis

This vulnerability affects Keycloak's SAML broker functionality, which enables federated identity management by allowing Keycloak to act as an identity broker between SAML identity providers and service providers. The core issue stems from improper validation of encrypted SAML assertions when the enclosing SAML response lacks a signature.

In a properly secured SAML flow, both the overall response and individual assertions should be validated to ensure integrity and authenticity. However, Keycloak's implementation fails to adequately verify encrypted assertions in scenarios where the SAML response itself is unsigned. This creates a window of opportunity for an attacker who possesses a legitimately signed SAML assertion to craft a malicious response containing an encrypted assertion for a different user principal.

The vulnerability is classified under CWE-1287 (Improper Validation of Specified Type of Input), as the system fails to properly validate the cryptographic binding between the response and its contained assertions. The attack requires network access and low-privilege authentication (a valid signed assertion), but can affect resources beyond the vulnerable component's security scope, potentially compromising the entire identity federation infrastructure.

Root Cause

The root cause of CVE-2026-2092 lies in the incomplete validation logic within Keycloak's SAML broker endpoint. Specifically, the code path handling encrypted assertions does not enforce signature verification on the enclosing SAML response when processing encrypted elements. This oversight allows an attacker to substitute or inject encrypted assertions without proper cryptographic verification of the overall message integrity.

The vulnerability reflects a common pitfall in SAML implementations where the relationship between response-level and assertion-level security controls is not properly enforced. While individual assertions may be signed, the lack of response signature validation creates an opportunity for assertion substitution attacks.

Attack Vector

The attack leverages the network-accessible SAML broker endpoint and requires the attacker to possess a valid signed SAML assertion, which could be obtained through legitimate access to an identity provider or through other means. The attacker then constructs a malicious SAML response that:

  1. Does not include a response-level signature (bypassing response integrity checks)
  2. Contains the attacker's valid signed assertion (to pass initial validation)
  3. Includes an encrypted assertion claiming a different principal identity

When Keycloak processes this crafted response, it accepts the encrypted assertion without properly verifying that it belongs to the authenticated principal, allowing the attacker to assume the identity of an arbitrary user. This technique is a variant of SAML assertion injection that specifically targets the handling of encrypted elements in unsigned responses.

Detection Methods for CVE-2026-2092

Indicators of Compromise

  • Unusual SAML authentication events where the authenticated user principal differs from expected patterns
  • SAML responses processed without response-level signatures containing encrypted assertions
  • Authentication logs showing users accessing resources they typically don't use or at unusual times
  • Multiple authentication attempts using the same base assertion with different encrypted assertion payloads

Detection Strategies

  • Monitor Keycloak authentication logs for SAML broker events involving unsigned responses with encrypted assertions
  • Implement SIEM rules to detect anomalous principal changes during SAML authentication flows
  • Audit user session creation events for inconsistencies between claimed identity and assertion source
  • Review SAML debug logs for mismatches between assertion signer identity and encrypted assertion subject

Monitoring Recommendations

  • Enable verbose SAML logging in Keycloak to capture detailed assertion processing information
  • Configure alerting for authentication events involving the SAML broker endpoint with high-privilege accounts
  • Implement session monitoring to detect sudden changes in user behavior patterns post-authentication
  • Track SAML IdP source correlation to identify assertion injection attempts

How to Mitigate CVE-2026-2092

Immediate Actions Required

  • Apply the latest security patches from Red Hat by referencing the published security advisories
  • Configure SAML identity providers to always sign SAML responses in addition to assertions
  • Audit existing SAML federation configurations to ensure signature requirements are enforced
  • Review recent authentication logs for potential exploitation attempts

Patch Information

Red Hat has released security advisories addressing this vulnerability. Organizations using affected Keycloak or Red Hat Single Sign-On products should apply the relevant patches:

  • Red Hat Security Advisory RHSA-2026:3925
  • Red Hat Security Advisory RHSA-2026:3926
  • Red Hat Security Advisory RHSA-2026:3947
  • Red Hat Security Advisory RHSA-2026:3948

Additional details are available in the Red Hat CVE Analysis for CVE-2026-2092 and Red Hat Bug Report #2437296.

Workarounds

  • Configure SAML identity provider broker settings to require signed SAML responses (not just signed assertions)
  • Implement network-level access controls to restrict access to the SAML broker endpoint
  • Enable strict validation mode for SAML processing if available in your Keycloak version
  • Consider temporarily disabling encrypted assertion processing if not required for your federation use cases
bash
# Example: Keycloak SAML realm configuration to enforce response signatures
# Navigate to your Identity Provider settings and ensure signature validation
# is enabled for both responses and assertions

# Via Keycloak Admin CLI, verify signature requirements:
kcadm.sh get identity-provider/instances/your-saml-idp \
  -r your-realm \
  --fields config

# Ensure these configuration values are set:
# "validateSignature": "true"
# "wantAssertionsSigned": "true"
# "wantAuthnRequestsSigned": "true"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechKeycloak

  • SeverityHIGH

  • CVSS Score7.7

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-1287
  • Technical References
  • Red Hat Security Advisory RHSA-2026:3925

  • Red Hat Security Advisory RHSA-2026:3926

  • Red Hat Security Advisory RHSA-2026:3947

  • Red Hat Security Advisory RHSA-2026:3948

  • Red Hat CVE Analysis CVE-2026-2092

  • Red Hat Bug Report #2437296
  • Related CVEs
  • CVE-2026-4636: Keycloak Auth Bypass Vulnerability

  • CVE-2026-4325: Keycloak Auth Bypass Vulnerability

  • CVE-2026-3872: Keycloak Auth Bypass Vulnerability

  • CVE-2026-4628: Keycloak Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English