Vulnerability identifier: #VU11464
Vulnerability risk: Low
CVSSv4.0: 7.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Red Hat OpenStack
Server applications /
Other server solutions
Vendor: Red Hat Inc.
Description
The vulnerability allows a local attacker to bypass security restriction on the target system.
The weakness exists due to resource-permission flaw in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key can bypass security restrcions and read or modify
data on Ceph cluster pools for OpenStack as though the attacker were
the OpenStack service, thus potentially reading or modifying data in an
OpenStack Block Storage volume.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Red Hat OpenStack: 12
External links
https://access.redhat.com/errata/RHSA-2018:0602
https://access.redhat.com/security/cve/cve-2017-12155
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.