6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 Medium
AI Score
Confidence
High
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
50.1%
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
CPE | Name | Operator | Version |
---|---|---|---|
fedora | eq | 35 | |
fedora | eq | 37 | |
ceph_storage | eq | 3.0 | |
ceph_storage | eq | 4.3 | |
ceph_storage | eq | 5.1 | |
ceph_storage | eq | 4.0 | |
ceph_storage | eq | 5.0 | |
ceph_storage | eq | 4.0 | |
ceph_storage | eq | 5.0 | |
ceph_storage_for_ibm_z_systems | eq | 4.0 |
access.redhat.com/security/cve/CVE-2021-3979
bugzilla.redhat.com/show_bug.cgi?id=2024788
github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656
github.com/ceph/ceph/pull/44765
lists.debian.org/debian-lts-announce/2023/10/msg00034.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/
tracker.ceph.com/issues/54006
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 Medium
AI Score
Confidence
High
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
50.1%