Severity
10.0 / Critical
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L
10.0 / Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Vendor
CloudFoundry Foundation
Description
Cloud Foundry UAA versions v76.12.0 through v78.12.0 are vulnerable to a private key exposure. The server contains a vulnerability where EC (Elliptic Curve) private keys are inadvertently exposed through the public /token_keys endpoint. This endpoint is designed to provide public key material for JWT token verification but incorrectly exposes private key components for EC keys. The vulnerability affects deployments using EC keys for JWT token signing. The vulnerability does not affect RSA key configurations, only deployments using EC keys for JWT signing.
Versions Affected
*Severity is high unless otherwise noted.
- uaa_release
All versions from v76.12.0 to v78.12.0 (inclusive) - CF Deployment
All versions from v30.0.0 to v56.0.0 (inclusive)
Mitigation
Users of affected products are strongly encouraged to follow the mitigations below.
The Cloud Foundry project recommends upgrading the following releases:
- uaa_release
Upgrade uaa_release versions to v78.13.0 or greater - CF Deployment
Upgrade cf-deployment version to v56.1.0 or greater
Includes uaa_release v78.13.0
Credit
Reported by the UAA Cloud Foundry team and by Arthur Chan from Ada Logics in collaboration with Claude and Anthropic Research
History
May 13th 2026: Initial vulnerability report published
May 14th 2026: Re-published to make visible
