Lucene search

K
cve[email protected]CVE-2023-1636
HistorySep 24, 2023 - 1:15 a.m.

CVE-2023-1636

2023-09-2401:15:43
CWE-653
web.nvd.nist.gov
42
cve-2023-1636
openstack
barbican
containers
vulnerability
nvd
security
data breach

CVSS3

6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

AI Score

5

Confidence

High

EPSS

0

Percentile

14.0%

A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.

Affected configurations

NVD
Node
openstackbarbicanMatch-
Node
redhatopenstack_platformMatch16.1
OR
redhatopenstack_platformMatch16.2
OR
redhatopenstack_platformMatch17.0
VendorProductVersionCPE
openstackbarbican-cpe:/a:openstack:barbican:-:::

CNA Affected

[
  {
    "product": "openstack-barbican",
    "vendor": "n/a",
    "defaultStatus": "affected"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 13 (Queens)",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:openstack:13"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 16.1",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openstack:16.1"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 16.2",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openstack:16.2"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenStack Platform 17.0",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openstack:17.0"
    ]
  },
  {
    "product": "OpenStack RDO",
    "vendor": "RDO",
    "collectionURL": "https://repos.fedorapeople.org/repos/openstack/",
    "packageName": "openstack-barbican",
    "defaultStatus": "affected"
  }
]

CVSS3

6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

AI Score

5

Confidence

High

EPSS

0

Percentile

14.0%