Lucene search

K
cve[email protected]CVE-2021-3429
HistoryApr 19, 2023 - 10:15 p.m.

CVE-2021-3429

2023-04-1922:15:10
CWE-532
web.nvd.nist.gov
108
cve
cloud-init
security
vulnerability
nvd

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

5.1%

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

Affected configurations

NVD
Node
canonicalcloud-initRange<21.2

CNA Affected

[
  {
    "collectionURL": "https://github.com/canonical/cloud-init/releases",
    "packageName": "cloud-init",
    "platforms": [
      "Linux"
    ],
    "product": "cloud-init",
    "repo": "https://github.com/canonical/cloud-init/",
    "vendor": "Canonical Ltd.",
    "versions": [
      {
        "lessThan": "21.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

5.1%