Overview
- Description
- In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 3.6
- Exploitability score
- 1.2
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48775266-A48C-43C7-91DE-A823148F10B4" }, { "criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819AE29E-1B9A-472B-89AD-B59FB3DF67D2" }, { "criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F1C4CA7-A2B6-487B-98D1-62A8ED5A9832" }, { "criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4CDD233-EC67-4CE1-973A-A3EFD88F679C" }, { "criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60C4DE1F-5942-4948-9732-6BCED81C4A5C" }, { "criteria": "cpe:2.3:a:cloudera:navigator_key_trustee_kms:5.12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B2EFA33-6959-4EA9-A57F-E26B134DA310" }, { "criteria": "cpe:2.3:a:cloudera:navigator_key_trustee_kms:5.13.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7628F61-91CE-401E-B443-741A1CEA1BF9" } ], "operator": "OR" } ] } ]