The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-28368

CVE-2026-28368: Redhat Apache Camel Auth Bypass Flaw

CVE-2026-28368 is an authentication bypass vulnerability in Redhat Build of Apache Camel - Hawtio caused by header parsing discrepancies that enable request smuggling attacks. This article covers technical details, affected versions, security impact, and available mitigations.

Published: April 3, 2026

CVE-2026-28368 Overview

A critical HTTP Request Smuggling vulnerability has been identified in Red Hat Undertow, the high-performance web server that serves as the foundation for JBoss Enterprise Application Platform and numerous other Red Hat products. This flaw allows remote attackers to craft specially designed HTTP requests where header names are parsed differently by Undertow compared to upstream proxies. The discrepancy in header interpretation creates a dangerous condition that can be exploited to bypass security controls and gain unauthorized access to protected resources.

Critical Impact

Remote attackers can exploit header parsing inconsistencies to smuggle malicious requests through security controls, potentially accessing unauthorized resources without authentication.

Affected Products

  • Red Hat Undertow
  • Red Hat JBoss Enterprise Application Platform 7.0.0 and 8.0.0
  • Red Hat Build of Apache Camel - Hawtio 4.0
  • Red Hat Build of Apache Camel for Spring Boot 4.0
  • Red Hat Data Grid 8.0
  • Red Hat Fuse 7.0.0
  • Red Hat Single Sign-On 7.0
  • Red Hat Process Automation 7.0
  • Red Hat JBoss Enterprise Application Platform Expansion Pack
  • Red Hat Enterprise Linux 9.0

Discovery Timeline

  • 2026-03-27 - CVE-2026-28368 published to NVD
  • 2026-03-31 - Last updated in NVD database

Technical Details for CVE-2026-28368

Vulnerability Analysis

This vulnerability is classified under CWE-444 (Inconsistent Interpretation of HTTP Requests), commonly known as HTTP Request Smuggling. The flaw exists in Undertow's HTTP header parsing logic, which interprets certain header names differently than upstream proxies such as load balancers, reverse proxies, or API gateways.

When a client sends a crafted HTTP request through a proxy chain, the proxy and Undertow may disagree on where one request ends and the next begins. This desynchronization allows an attacker to "smuggle" a hidden request that bypasses the proxy's security inspection while being processed by the backend Undertow server.

The vulnerability enables attacks that can compromise confidentiality and integrity of data, allowing unauthorized access to protected endpoints and potential manipulation of responses to other users.

Root Cause

The root cause lies in Undertow's non-compliant or inconsistent parsing of HTTP header names compared to RFC standards and common proxy implementations. When header names contain unusual characters, whitespace, or encoding variations, Undertow may interpret these differently than the upstream proxy.

This parsing discrepancy means that a proxy might see headers as part of one request while Undertow treats them as boundaries for separate requests. The lack of strict alignment with proxy implementations creates exploitable edge cases in the request parsing pipeline.

Attack Vector

The attack is network-based and requires no authentication or user interaction, making it highly exploitable in internet-facing deployments. An attacker can exploit this vulnerability remotely by:

  1. Identifying a deployment where Undertow sits behind a proxy or load balancer
  2. Crafting HTTP requests with manipulated header names that trigger parsing discrepancies
  3. Embedding a secondary "smuggled" request within the body of the legitimate request
  4. The proxy forwards what it sees as one request, while Undertow processes it as two separate requests

The smuggled request bypasses any security controls enforced at the proxy layer, potentially allowing access to administrative endpoints, session hijacking, or cache poisoning attacks. Since this requires no privileges and can be executed anonymously over the network, environments with Undertow behind reverse proxies are particularly at risk.

Detection Methods for CVE-2026-28368

Indicators of Compromise

  • Unusual HTTP responses being returned to clients that don't match their requests
  • Log entries showing requests to sensitive endpoints without corresponding proxy access logs
  • Evidence of cache poisoning or incorrect content being served to users
  • Discrepancies between proxy request counts and backend server request counts

Detection Strategies

  • Deploy Web Application Firewall (WAF) rules to detect and block requests with malformed or suspicious header constructions
  • Implement request correlation between proxy and backend logs to identify smuggled requests
  • Monitor for unusual access patterns to administrative or protected endpoints
  • Use anomaly detection to identify requests that bypass expected authentication flows

Monitoring Recommendations

  • Enable detailed HTTP access logging on both proxy and Undertow servers for forensic analysis
  • Configure alerting for requests reaching sensitive endpoints without proper authentication headers
  • Monitor HTTP error rates and response time anomalies that may indicate smuggling attempts
  • Review and correlate Content-Length and Transfer-Encoding header usage patterns

How to Mitigate CVE-2026-28368

Immediate Actions Required

  • Review the Red Hat CVE-2026-28368 Advisory for vendor-specific guidance and patch availability
  • Audit all deployments using Undertow-based products to identify affected systems
  • Ensure strict HTTP parsing modes are enabled on upstream proxies where available
  • Implement network segmentation to limit exposure of vulnerable Undertow instances

Patch Information

Red Hat has acknowledged this vulnerability and is tracking it via Red Hat Bugzilla Report #2443261. Organizations should monitor the Red Hat Customer Portal for official patches and errata updates for affected products including JBoss EAP, Single Sign-On, Data Grid, and other Undertow-based solutions.

Subscribe to Red Hat security announcements to receive immediate notification when patches become available for your specific product versions.

Workarounds

  • Configure upstream proxies to normalize and strictly validate HTTP headers before forwarding to Undertow
  • Implement HTTP/2 end-to-end where possible, as request smuggling is primarily an HTTP/1.1 concern
  • Deploy additional request validation at the application layer to reject requests with suspicious header patterns
  • Consider implementing a strict allowlist of expected header names and rejecting requests with non-standard headers
bash
# Example: Configure nginx to normalize headers and reject ambiguous requests
# Add to nginx proxy configuration

# Reject requests with both Content-Length and Transfer-Encoding
if ($http_transfer_encoding ~* "chunked" ) {
    set $has_te "1";
}
if ($content_length != "") {
    set $has_cl "1";
}
if ($has_te$has_cl = "11") {
    return 400;
}

# Normalize header handling
proxy_http_version 1.1;
proxy_set_header Connection "";

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechUndertow

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-444
  • Vendor Resources
  • Red Hat CVE-2026-28368 Advisory

  • Red Hat Bugzilla Report #2443261
  • Related CVEs
  • CVE-2026-28369: Apache Camel Hawtio Auth Bypass Flaw

  • CVE-2026-28367: Undertow Auth Bypass Vulnerability

  • CVE-2026-3260: Undertow DoS Vulnerability

  • CVE-2025-12543: Redhat Apache Camel SSRF Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English