Lucene search

K
cvelistRedhatCVELIST:CVE-2020-1731
HistoryMar 02, 2020 - 4:22 p.m.

CVE-2020-1731

2020-03-0216:22:36
CWE-341
redhat
www.cve.org

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.1%

A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.

CNA Affected

[
  {
    "product": "keycloak",
    "vendor": "Red Hat",
    "versions": [
      {
        "status": "affected",
        "version": "all versions of keycloak operator before keycloak operator 8.0.2"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.1%

Related for CVELIST:CVE-2020-1731