4.9 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N
6 Medium
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
65.3%
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | keystone | < 2:22.0.0-2 | keystone_2:22.0.0-2_all.deb |
Debian | 11 | all | keystone | < 2:18.0.0-3+deb11u1 | keystone_2:18.0.0-3+deb11u1_all.deb |
Debian | 10 | all | keystone | < 2:14.2.0-0+deb10u1 | keystone_2:14.2.0-0+deb10u1_all.deb |
Debian | 999 | all | keystone | < 2:25.0.0-2 | keystone_2:25.0.0-2_all.deb |
Debian | 13 | all | keystone | < 2:25.0.0-2 | keystone_2:25.0.0-2_all.deb |