A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-3099 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2442232 | Issue Tracking Third Party Advisory |
| https://gitlab.gnome.org/GNOME/libsoup/-/issues/495 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-12 14:16
Updated : 2026-03-23 14:02
NVD link : CVE-2026-3099
Mitre link : CVE-2026-3099
CVE.ORG link : CVE-2026-3099
JSON object : View
Products Affected
gnome
- libsoup
redhat
- enterprise_linux
CWE
CWE-323
Reusing a Nonce, Key Pair in Encryption
