#VU27606 Missing Required Cryptographic Step in OpenStack Keystone


| Updated: 2021-10-06

Vulnerability identifier: #VU27606

Vulnerability risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12692

CWE-ID: CWE-325

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OpenStack Keystone
Client/Desktop applications / Other client software

Vendor: Openstack

Description

The vulnerability allows a remote attacker to intercept and decrypt sensitive information.

The vulnerability exists due to the EC2 API does not have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Mitigation
Install update from vendor's website.

Vulnerable software versions

OpenStack Keystone: 8.0.0 - 2015.1.4


External links
http://bugs.launchpad.net/keystone/+bug/1872737
http://www.openwall.com/lists/oss-security/2020/05/06/4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability