CVE-2026-27478

9.1 CRITICAL

📋 TL;DR

This critical authentication bypass vulnerability in Unity Catalog allows attackers to forge JWTs with arbitrary issuer claims to bypass authentication. Any system running Unity Catalog 0.4.0 or earlier with the token exchange endpoint exposed is affected, potentially allowing unauthorized access to sensitive data and AI assets.

💻 Affected Systems

Products:
  • Unity Catalog
Versions: 0.4.0 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the /api/1.0/unity-control/auth/tokens endpoint accessible are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative access to Unity Catalog, exfiltrate all data assets, manipulate AI models, and pivot to connected systems.

🟠

Likely Case

Unauthorized access to sensitive data assets and AI models stored in Unity Catalog, potentially leading to data theft, manipulation, or denial of service.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit by crafting JWTs with arbitrary issuer claims. No authentication is required to reach the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.4.1 or later

Vendor Advisory: https://github.com/unitycatalog/unitycatalog/security/advisories/GHSA-qqcj-rghw-829x

Restart Required: Yes

Instructions:

1. Upgrade Unity Catalog to version 0.4.1 or later. 2. Restart all Unity Catalog services. 3. Verify the fix by testing authentication with valid and invalid JWTs.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the vulnerable endpoint using firewall rules or network policies.

iptables -A INPUT -p tcp --dport [UNITY_CATALOG_PORT] -m string --string "/api/1.0/unity-control/auth/tokens" --algo bm -j DROP

Reverse Proxy Validation

all

Implement issuer validation at a reverse proxy layer before requests reach Unity Catalog.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Unity Catalog from untrusted networks
  • Deploy a WAF or API gateway with JWT validation rules to block malicious requests

🔍 How to Verify

Check if Vulnerable:

Check Unity Catalog version and test if the token exchange endpoint accepts JWTs with untrusted issuer claims.

Check Version:

Check Unity Catalog deployment configuration or container image tags for version information.

Verify Fix Applied:

After patching, verify that JWTs with untrusted issuer claims are rejected and only validated issuer JWTs are accepted.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with unusual issuer claims
  • Successful authentications from unexpected identity providers
  • High volume of requests to /api/1.0/unity-control/auth/tokens

Network Indicators:

  • Unusual traffic patterns to the token exchange endpoint
  • Requests containing JWTs with non-standard issuer URLs

SIEM Query:

source="unity-catalog" AND (uri_path="/api/1.0/unity-control/auth/tokens" AND (status=200 OR jwt_issuer NOT IN ["trusted-issuers"]))

🔗 References

📤 Share & Export