The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-42084

CVE-2026-42084: OpenC3 COSMOS Auth Bypass Vulnerability

CVE-2026-42084 is an authentication bypass vulnerability in OpenC3 COSMOS that allows attackers with a session token to change passwords without the old password, enabling account takeover. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: May 7, 2026

CVE-2026-42084 Overview

OpenC3 COSMOS is an open-source command and control platform used to send commands and receive telemetry from embedded systems. CVE-2026-42084 affects the password change functionality in versions prior to 6.10.5 and 7.0.0-rc3. The flaw allows a user to change their password without supplying the current password, because the endpoint accepts a valid session token as authorization. An attacker who already holds a valid session token can rotate the account password, achieve persistent control of the account, and lock out the legitimate user. The issue is classified under CWE-620: Unverified Password Change.

Critical Impact

An attacker with a stolen session token, including one belonging to an administrator, can permanently hijack the account by resetting its password without knowing the original credentials.

Affected Products

  • OpenC3 COSMOS versions prior to 6.10.5
  • OpenC3 COSMOS 7.x versions prior to 7.0.0-rc3
  • Deployments using OpenC3::AuthModel for session and password verification

Discovery Timeline

  • 2026-05-04 - CVE-2026-42084 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-42084

Vulnerability Analysis

The vulnerability resides in the password change workflow exposed by openc3-cosmos-cmd-tlm-api/app/controllers/auth_controller.rb. When a user requested a password update, the controller invoked OpenC3::AuthModel.verify_no_service with no_password: false. That mode accepted either the current password or any valid session token as proof of identity. An attacker who obtained a session token through phishing, browser compromise, log exposure, or token theft could submit it as the "current password" parameter and successfully change the account password.

The behavior breaks the security boundary between authentication and re-authentication. Standard password change flows require knowledge of the existing password to defend against session hijacking and assumed-breach scenarios. By accepting a session token, COSMOS allowed token-only persistence on the account, including for administrative users with full command authority over connected embedded systems.

Root Cause

The root cause is a mode-selection flaw in OpenC3::AuthModel.verify_no_service. The function used a single boolean (no_password) that conflated two distinct verification policies. When invoked from the password change handler, it permitted token-based verification where password-only verification was required. The patch replaces the boolean with an explicit mode parameter accepting :password, :token, or :any, and the password change endpoint now uses mode: :password.

Attack Vector

Exploitation requires network access to the COSMOS API and a valid session token for the targeted account. The attacker submits a password change request, supplying the captured session token in place of the current password. The server validates the token, accepts the new password, and persists it. The legitimate user is then unable to authenticate, while the attacker retains long-term access.

ruby
# Vulnerable call site in auth_controller.rb (before patch)
if OpenC3::AuthModel.verify_no_service(params[:password], no_password: false)
  render :plain => OpenC3::AuthModel.generate_session()
else
  record_user_bad_attempt
end

# Patched call site (after fix) - enforces password-only verification
if OpenC3::AuthModel.verify_no_service(params[:password], mode: :password)
  render :plain => OpenC3::AuthModel.generate_session()
else
  record_user_bad_attempt
end

Source: OpenC3 COSMOS commit 2e62371

Detection Methods for CVE-2026-42084

Indicators of Compromise

  • Password change events on COSMOS accounts not preceded by a corresponding interactive password entry from the user.
  • Successful authentication followed shortly by a password update from the same session token, particularly for administrative accounts.
  • Repeated failed logins from a legitimate user after a successful password change initiated from an unfamiliar IP address.

Detection Strategies

  • Audit auth_controller request logs for POST calls to the password change endpoint and correlate with the source session token age and origin.
  • Compare the IP address and user agent of the password change request to recent baseline activity for the affected account.
  • Alert on any password change for administrative or service accounts in COSMOS deployments running versions earlier than 6.10.5 or 7.0.0-rc3.

Monitoring Recommendations

  • Forward COSMOS application logs to a centralized log platform and build queries for password change events tied to session-token-only authentication.
  • Monitor for lockout patterns where a legitimate user repeatedly fails login immediately after a successful password reset.
  • Track session token issuance and reuse, flagging tokens used from multiple geolocations within short time windows.

How to Mitigate CVE-2026-42084

Immediate Actions Required

  • Upgrade OpenC3 COSMOS to version 6.10.5 or 7.0.0-rc3 or later without delay.
  • Force a password reset for all COSMOS users, prioritizing administrative accounts, after upgrading.
  • Invalidate all active session tokens to evict any attacker who may already have established persistence.
  • Review recent password change events in audit logs for anomalies and revert any unauthorized changes.

Patch Information

The maintainers fixed the issue in OpenC3 COSMOS v6.10.5 and OpenC3 COSMOS v7.0.0-rc3. The change replaces the no_password boolean in OpenC3::AuthModel.verify_no_service with an explicit mode parameter and updates the password change controller to require mode: :password. Full details are available in the GitHub Security Advisory GHSA-wgx6-g857-jjf7.

Workarounds

  • If immediate upgrade is not possible, restrict network access to the COSMOS API to trusted management subnets only.
  • Shorten session token lifetimes and require re-authentication for sensitive operations such as password changes.
  • Rotate all user credentials and session secrets, and audit administrative accounts for unexpected modifications.
bash
# Upgrade OpenC3 COSMOS to a patched release
git fetch --tags
git checkout v6.10.5     # or v7.0.0-rc3 for the 7.x release line

# Rebuild and restart the COSMOS containers
./openc3.sh stop
./openc3.sh build
./openc3.sh start

# After upgrade, force password rotation for all users via the admin console
# and invalidate existing session tokens by restarting the auth services.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechOpenc3

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-620
  • Technical References
  • GitHub Commit Update

  • GitHub Release v6.10.5

  • GitHub Release v7.0.0-rc3

  • GitHub Security Advisory GHSA-wgx6-g857-jjf7
  • Related CVEs
  • CVE-2026-42087: OpenC3 COSMOS SQL Injection Vulnerability

  • CVE-2026-42086: OpenC3 COSMOS Command Sender XSS Flaw

  • CVE-2026-42085: OpenC3 COSMOS Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English