Lucene search

K
cve[email protected]CVE-2021-3429
HistoryApr 19, 2023 - 10:15 p.m.

CVE-2021-3429

2023-04-1922:15:10
CWE-532
web.nvd.nist.gov
107
cve
cloud-init
security
vulnerability
nvd

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

Affected configurations

NVD
Node
canonicalcloud-initRange<21.2

CNA Affected

[
  {
    "collectionURL": "https://github.com/canonical/cloud-init/releases",
    "packageName": "cloud-init",
    "platforms": [
      "Linux"
    ],
    "product": "cloud-init",
    "repo": "https://github.com/canonical/cloud-init/",
    "vendor": "Canonical Ltd.",
    "versions": [
      {
        "lessThan": "21.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%