CVE-2018-1128

Published Jul 10, 2018

Last updated 4 days ago

Overview

Description
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
Source
secalert@redhat.com
NVD status
Modified

Risk scores

CVSS 3.0

Type
Primary
Base score
7.5
Impact score
5.9
Exploitability score
1.6
Vector string
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
5.4
Impact score
6.4
Exploitability score
5.5
Vector string
AV:A/AC:M/Au:N/C:P/I:P/A:P

Weaknesses

secalert@redhat.com
CWE-294
nvd@nist.gov
CWE-287

Social media

Hype score
Not currently trending

Configurations