Arqit Symmetric Key Agreement Platform Exposes Critical Keys via HTTP GET
The National Vulnerability Database has disclosed CVE-2026-33583, a high-severity vulnerability impacting the Arqit Symmetric Key Agreement Platform versions prior to 26.03. This flaw exposes the QKEY, used in the ‘OTA-Quantum’ device registration process, and internal system keys.
The critical issue stems from an unauthenticated and unencrypted HTTP GET method. This means an attacker can simply make a web request and retrieve sensitive cryptographic material without any prior authentication or encryption, effectively nullifying the security posture of systems relying on these keys. The CVSS score of 8.7 (HIGH) reflects the profound impact on confidentiality and integrity, with network access and high impact on both.
For defenders, this is a clear-cut case of foundational cryptographic elements being undermined by insecure transport. Attackers are always looking for the easiest path to compromise, and leaking keys via unencrypted HTTP is an open invitation. This vulnerability allows for direct key exfiltration, which can lead to widespread compromise of devices registered with the platform and potentially allow for impersonation or decryption of communications.
What This Means For You
- If your organization utilizes the Arqit Symmetric Key Agreement Platform, you must immediately verify your version. Prioritize patching to version 26.03 or newer to mitigate CVE-2026-33583. Furthermore, assume any QKEYs or internal system keys used with affected versions have been compromised and initiate a key rotation process across all impacted devices and services.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-33583 - Arqit Symmetric Key Exposure via HTTP GET
title: CVE-2026-33583 - Arqit Symmetric Key Exposure via HTTP GET
id: scw-2026-05-13-ai-1
status: experimental
level: critical
description: |
Detects unauthenticated HTTP GET requests to the '/ota-quantum' endpoint with a 'qkey=' parameter, indicating potential exposure of QKEYs as described in CVE-2026-33583. This is a critical indicator of the vulnerability being exploited.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-33583/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-method:
- 'GET'
cs-uri:
- '/ota-quantum'
cs-uri-query|contains:
- 'qkey='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-33583 | Information Disclosure | Arqit Symmetric Key Agreement Platform before 26.03 |
| CVE-2026-33583 | Information Disclosure | Exposure of QKEY via unauthenticated and unencrypted HTTP GET method |
| CVE-2026-33583 | Information Disclosure | Exposure of internal system keys via unauthenticated and unencrypted HTTP GET method |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 13, 2026 at 22:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.