Yubico webauthn-server-core Vulnerability Leads to Impersonation

Yubico webauthn-server-core Vulnerability Leads to Impersonation

The National Vulnerability Database (NVD) has disclosed CVE-2026-46419, affecting Yubico webauthn-server-core (also known as java-webauthn-server) versions 2.8.0 before 2.8.2. This high-severity vulnerability, with a CVSS score of 7.5, stems from an incorrect check of a function’s return value within the second-factor authentication flow. This flaw allows for user impersonation, effectively bypassing a critical security layer.

This isn’t a theoretical issue; it’s a fundamental breakdown in how a security device’s software validates trust. The root cause, categorized as CWE-253 (Incorrect Check of Function Return Value), means the application isn’t properly handling error conditions or unexpected outputs from security-critical functions. For an attacker, this is a golden ticket: if they can manipulate the return value, they can trick the system into thinking they’ve successfully authenticated, even without the second factor.

Organizations leveraging Yubico’s webauthn-server-core for their multi-factor authentication (MFA) implementations are directly exposed. The impact is significant, leading to potential complete compromise of user accounts. This underscores the critical importance of robust error handling and thorough input validation, especially in components designed to secure authentication processes.

What This Means For You

  • If your organization uses Yubico webauthn-server-core, specifically versions 2.8.0 or 2.8.1, you need to immediately prioritize upgrading to version 2.8.2 or later. This vulnerability allows an attacker to impersonate users, effectively nullifying your second-factor authentication. Audit your logs for any suspicious authentication attempts, especially those that appear to bypass MFA, immediately after patching.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

Yubico webauthn-server-core Impersonation Attempt - CVE-2026-46419

Sigma YAML — free preview
title: Yubico webauthn-server-core Impersonation Attempt - CVE-2026-46419
id: scw-2026-05-14-ai-1
status: experimental
level: critical
description: |
  Detects potential exploitation of CVE-2026-46419 by looking for POST requests to the /webauthn/assertion endpoint that result in a successful authentication (status 200). This vulnerability allows attackers to bypass second-factor authentication, leading to impersonation. This rule specifically targets the webauthn assertion endpoint, which is involved in the second-factor flow where the vulnerability lies.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-46419/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: authentication
detection:
  selection:
      cs-uri|contains:
          - '/webauthn/assertion'
      cs-method|exact:
          - 'POST'
      sc-status|exact:
          - '200'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-46419 Auth Bypass Yubico webauthn-server-core (aka java-webauthn-server) versions before 2.8.2
CVE-2026-46419 Auth Bypass Impersonation vulnerability in the second factor flow of Yubico webauthn-server-core
CVE-2026-46419 Auth Bypass Incorrect return value check in a function within the second factor flow of Yubico webauthn-server-core
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 14, 2026 at 05:17 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-44919 — In OpenStack Ironic through 35.x before a3f6d73, during

CVE-2026-44919 — In OpenStack Ironic through 35.x before a3f6d73, during image handling, an infinite loop in checksum calculations can occur via the file:///dev/zero URL.

vulnerabilityCVEmedium-severitycwe-696
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-41281 — Information Disclosure

CVE-2026-41281 — Android App "あんしんフィルター for au" provided by KDDI CORPORATION contains Cleartext Transmission of Sensitive Information (CWE-319) vulnerability. A man-in-the-middle attacker may access and...

vulnerabilityCVEmedium-severityinformation-disclosurecwe-319
/SCW Vulnerability Desk /MEDIUM /4.8 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-32991: Team Member Privilege Escalation to Owner Account

CVE-2026-32991 — Improper authorization checks of team members privileges allow a team member to escalate privileges to the team owner account.

vulnerabilityCVEhigh-severitycwe-863
/SCW Vulnerability Desk /HIGH /7.1 /⚑ 2 IOCs /⚙ 2 Sigma