5.5
CVE-2018-6185
- EPSS 0.11%
- Published 07.06.2019 15:29:00
- Last modified 21.11.2024 04:10:14
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.
Data is provided by the National Vulnerability Database (NVD)
Cloudera ≫ Cloudera Manager Version5.12.0
Cloudera ≫ Cloudera Manager Version5.12.1
Cloudera ≫ Cloudera Manager Version5.12.2
Cloudera ≫ Cloudera Manager Version5.13.0
Cloudera ≫ Cloudera Manager Version5.13.1
Cloudera ≫ Navigator Key Trustee Kms Version5.12.0
Cloudera ≫ Navigator Key Trustee Kms Version5.13.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.11% | 0.302 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 5.5 | 8 | 4.9 |
AV:N/AC:L/Au:S/C:N/I:P/A:P
|