6.5

CVE-2018-1129

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

Data is provided by the National Vulnerability Database (NVD)
RedhatCeph Storage Version1.3
RedhatCeph Storage Version3
RedhatCeph Storage Mon Version2
RedhatCeph Storage Mon Version3
RedhatCeph Storage Osd Version2
RedhatCeph Storage Osd Version3
RedhatEnterprise Linux Version7.0
CephCeph Version10.2.0
CephCeph Version10.2.1
CephCeph Version10.2.2
CephCeph Version10.2.3
CephCeph Version10.2.4
CephCeph Version10.2.5
CephCeph Version10.2.6
CephCeph Version10.2.7
CephCeph Version10.2.8
CephCeph Version10.2.9
CephCeph Version10.2.10
CephCeph Version10.2.11
CephCeph Version12.2.0
CephCeph Version12.2.1
CephCeph Version12.2.2
CephCeph Version12.2.3
CephCeph Version12.2.4
CephCeph Version12.2.5
CephCeph Version12.2.6
CephCeph Version12.2.7
CephCeph Version13.2.0
CephCeph Version13.2.1
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
OpensuseLeap Version15.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.39% 0.595
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:N/I:P/A:N
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.