Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15136
HistoryAug 06, 2020 - 10:45 p.m.

CVE-2020-15136 Improper authentication in etcd

2020-08-0622:45:14
CWE-287
GitHub_M
www.cve.org
7
cve-2020-15136
etcd
dns srv records
gateway tls authentication
endpoints detection

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

AI Score

6.8

Confidence

High

EPSS

0.003

Percentile

69.2%

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

CNA Affected

[
  {
    "product": "etcd",
    "vendor": "etcd-io",
    "versions": [
      {
        "status": "affected",
        "version": ">= 3.4.0, < 3.4.10"
      },
      {
        "status": "affected",
        "version": "< 3.3.23"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

AI Score

6.8

Confidence

High

EPSS

0.003

Percentile

69.2%