A maximum-severity authentication bypass hit enterprise Java applications. HCL BigFix is the first to be detection-ready.
|
Key Takeaways:
|
CVE-2026-29000 is a critical authentication bypass (CVSS 10.0) in the pac4j-jwt Java library, disclosed on March 4, 2026. Attackers with access to a server’s RSA public key can forge JWT tokens and authenticate as any user—including administrators—without credentials. Because pac4j-jwt is often bundled inside WAR files, shaded JARs, and nested dependencies, many organizations won’t know they’re running it. Standard network-based and signature-based scanners cannot detect it. Finding it requires filesystem-level scanning across every endpoint.
HCL BigFix shipped a free detection tool within 72 hours of disclosure. As of this writing, no other endpoint management platform has announced a comparable capability.
What HCL BigFix Shipped and How Fast
On March 7, three days after disclosure, HCL BigFix published a detection methodology on the BigFix Forum, followed by official content on the BES Inventory and License site by March 10. This follows the same Logpresso-based scanning playbook that HCL BigFix used during Log4Shell in 2022: rapid content development, filesystem-level scanning at scale, and centralized result reporting.
|
Date |
Action |
|
March 4 |
CVE-2026-29000 was publicly disclosed. CVSS 10.0 confirmed. |
|
March 7 |
The HCL BigFix team publishes detection methodology and a custom scanner on the BigFix Forum. |
|
March 10 |
Digitally signed scanner (v3.0.2) hosted at software.bigfix.com. Official Fixlets published. |
- pac4j-jwt Scanner (v3.0.2): Inspects JAR files across endpoint filesystems to identify vulnerable library versions.
- HCL BigFix Fixlets: Fixlet 607 is a Task — deploy it first to run the scan and find vulnerable pac4j-jwt versions on endpoints. Fixlet 608 is an Analysis — activate it to report which endpoints are vulnerable, with results visible directly in the BigFix console.
- Open Source: Full source code at github.com/bigfix/content for review before deployment.
|
A HCL BigFix community member confirmed on March 8 that detection was not yet available in the leading vulnerability management and endpoint security platforms they evaluated. HCL BigFix was already live. |
What to Look for in Your Endpoint Platform
Not every endpoint architecture can handle embedded-library threats like this. Here’s what separates platforms that can respond from those that can’t:
|
Capability |
Common Gap |
What HCL BigFix Delivers |
|
Filesystem Scanning |
Network-based or agentless scans cannot inspect JAR contents inside application packages. |
Agent-based architecture scans each endpoint’s disk for vulnerable libraries in WAR files, shaded JARs, and nested dependencies. |
|
Custom Content Speed |
Platforms requiring customers to script their own detection leave a gap during the critical first days. |
Digitally signed detection content shipped first than other vendors. Community content is available even earlier. |
|
Cross-Platform Depth |
Single-OS platforms miss Java apps running across mixed environments. |
120+ operating systems. Java runs everywhere—detection must too. |
|
Centralized Reporting |
Manual aggregation across thousands of endpoints wastes response time. |
Results flow directly to the BigFix console. Zero manual aggregation. |
|
Air-Gapped Coverage |
Cloud-first platforms cannot scan disconnected endpoints. |
Continuous management in disconnected environments—critical for regulated industries. |
What Immediate Actions Address CVE-2026-29000?
For HCL BigFix Users
All Organizations
- Upgrade pac4j-jwt to 4.5.9, 5.7.9, or 6.3.3 immediately. This is the only durable fix.
- Audit authentication logs for token forgery or unauthorized admin access since March 4, 2026.
- Watch for anomalous token formats. JWS = 3 dot-separated segments. JWE = 5. Unexpected JWE tokens are a red flag.
Not On HCL BigFix?
- Learn more and get a CVE-2026-29000 exposure assessment
FAQ
1. What is CVE-2026-29000?
A CVSS 10.0 authentication bypass in the pac4j-jwt Java library. Attackers can forge JWT tokens to impersonate any user, including administrators and versions before 4.5.9, 5.7.9, and 6.3.3 are affected. (Learn more)
2. How does HCL BigFix detect it?
A custom filesystem scanner deployed via Fixlet content scan file system and inspects JAR files on each endpoint. Results report directly to the BigFix console.
3. Is the detection tool free?
Yes. Available at no additional cost in the BES Inventory and License site.
4. Can other endpoint platforms detect this?
As of March 18, 2026, no other endpoint management platform has published a specific detection tool for CVE-2026-29000. Organizations should verify with their vendor whether filesystem-level JAR scanning is supported.
Start a Conversation with Us
We’re here to help you find the right solutions and support you in achieving your business goals.





