Event Streams documentation for generating .p12 files incorrectly adds the CA private key into the file which results in the CA private key being added to the trust store. This trust store is distributed to client applications via the Event Streams UI and CLI and so gives client access to the CA private key. This issue only arises when using custom provided certificates and following the Event Streams documentation to generate the .p12 file.
CVEID:CVE-2021-29792
**DESCRIPTION:**IBM Event Streams could allowa user the CA private key to create their own certificates and deploy them in the cluster and gain privileges of another user.
CVSS Base score: 4.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/203450 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L)
Affected Product(s) | Version(s) |
---|---|
IBM Event Streams | 10.0.x |
IBM Event Streams | 10.1.x |
IBM Event Streams | 10.2.x |
IBM Event Streams | 10.3.x |
When generating your PKCS12 truststore, ensure that the truststore does not contain the CA private key. This is important because the .p12
file will be available to download from the Event Streams UI and distributed to clients.
Refer to the IBM Event Streams documentation when providing a CA certificate and key.