Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-24845

CVE-2026-24845: malcontent Information Disclosure Flaw

CVE-2026-24845 is an information disclosure vulnerability in malcontent that exposes Docker registry credentials via malicious OCI images. This post covers the technical details, affected versions, and mitigation.

Published: January 29, 2026

CVE-2026-24845 Overview

CVE-2026-24845 is a credential exposure vulnerability affecting the malcontent supply-chain security tool. Malcontent discovers supply-chain compromises through context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference.

Malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a WWW-Authenticate header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. This constitutes an Insufficiently Protected Credentials weakness (CWE-522).

Critical Impact

Docker registry credentials could be exfiltrated to attacker-controlled endpoints when scanning malicious OCI image references, potentially compromising container registry access and enabling supply-chain attacks.

Affected Products

  • malcontent versions 0.10.0 to 1.20.2
  • Systems using malcontent with Docker credential keychain configured
  • Environments performing OCI image scanning against untrusted registries

Discovery Timeline

  • 2026-01-29 - CVE CVE-2026-24845 published to NVD
  • 2026-01-29 - Last updated in NVD database

Technical Details for CVE-2026-24845

Vulnerability Analysis

The vulnerability exists in malcontent's OCI image handling functionality. When malcontent scans OCI images, it relies on the google/go-containerregistry library for container image operations. By default, this library uses the Docker credential keychain to authenticate with container registries.

A malicious registry can exploit the OAuth-style token authentication flow used by container registries. When malcontent attempts to pull an image, the registry can respond with a WWW-Authenticate header that specifies an authentication realm controlled by the attacker. The go-containerregistry library would then send the user's Docker credentials to this attacker-controlled endpoint, resulting in credential theft.

This attack is particularly dangerous in supply-chain security contexts where malcontent is used to analyze potentially malicious container images from untrusted sources.

Root Cause

The root cause is the default authentication behavior in the OCI image pull functionality. Malcontent did not implement anonymous authentication as the default for OCI pulls, instead inheriting the default behavior from google/go-containerregistry which automatically attempts to authenticate using locally stored Docker credentials. This design decision created an attack surface where untrusted registries could redirect authentication to capture credentials.

Attack Vector

The attack requires a user to scan a crafted OCI image reference pointing to a malicious registry:

  1. Attacker sets up a malicious container registry
  2. Attacker crafts an OCI image reference pointing to their registry
  3. Target runs malcontent scan against the malicious image reference
  4. Malicious registry responds with WWW-Authenticate header redirecting to attacker endpoint
  5. Malcontent's underlying library sends Docker credentials to attacker endpoint
  6. Attacker captures registry credentials

The security patch introduces an ociAuthFlag to control authentication behavior:

go
 	minFileRiskFlag           string
 	minLevelFlag              int
 	minRiskFlag               string
+	ociAuthFlag               bool
 	ociFlag                   bool
 	outputFlag                string
 	profileFlag               bool

Source: GitHub Commit Log

The fix modifies the OCI archive handling to pass the authentication flag:

go
 	)

 	if c.OCI {
-		srcPath, err = archive.OCI(ctx, srcPath)
+		srcPath, err = archive.OCI(ctx, srcPath, c.OCIAuth)
 		if err != nil {
 			return nil, fmt.Errorf("failed to prepare scan path: %w", err)
 		}
-		destPath, err = archive.OCI(ctx, destPath)
+		destPath, err = archive.OCI(ctx, destPath, c.OCIAuth)
 		if err != nil {
 			return nil, fmt.Errorf("failed to prepare scan path: %w", err)
 		}

Source: GitHub Commit Log

Detection Methods for CVE-2026-24845

Indicators of Compromise

  • Unexpected outbound authentication requests to unknown registry endpoints
  • Docker credential access logs showing authentication to unfamiliar domains
  • Network connections from malcontent processes to non-standard registry URLs
  • Registry authentication tokens appearing in unexpected network traffic

Detection Strategies

  • Monitor for WWW-Authenticate header redirects to external domains during OCI operations
  • Implement network-level detection for credential-bearing HTTP requests to untrusted endpoints
  • Audit malcontent command invocations with OCI image references pointing to unknown registries
  • Deploy endpoint detection to identify credential exfiltration patterns

Monitoring Recommendations

  • Enable verbose logging for malcontent OCI operations to track authentication flows
  • Implement network egress monitoring for container registry authentication traffic
  • Configure alerts for Docker credential file access by malcontent processes
  • Monitor for DNS queries to suspicious registry domains during malcontent execution

How to Mitigate CVE-2026-24845

Immediate Actions Required

  • Upgrade malcontent to version 1.20.3 or later immediately
  • Review recent malcontent scan logs for OCI image references from untrusted sources
  • Rotate Docker registry credentials if potentially exposed
  • Restrict malcontent OCI scanning to trusted registry sources until patched

Patch Information

Version 1.20.3 fixes the issue by defaulting to anonymous authentication for OCI pulls. The patch introduces an explicit ociAuthFlag that must be enabled if authenticated registry access is required.

For detailed patch information, see the GitHub Security Advisory and the security commit.

Workarounds

  • Avoid scanning OCI images from untrusted registries until patched
  • Isolate malcontent execution in environments without Docker credential access
  • Use network segmentation to prevent credential exfiltration to external endpoints
  • Remove or restrict Docker credential keychain access for malcontent processes
bash
# Configuration example - Remove Docker credentials before scanning untrusted images
# Backup existing credentials
mv ~/.docker/config.json ~/.docker/config.json.bak

# Run malcontent scan without credentials
malcontent scan --oci untrusted-image:tag

# Restore credentials after scan
mv ~/.docker/config.json.bak ~/.docker/config.json

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechMalcontent

  • SeverityMEDIUM

  • CVSS Score6.5

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-522
  • Technical References
  • GitHub Commit Log

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-24846: malcontent Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English