9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.6 Medium
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
70.0%
Red Hat 3scale (aka RH-3scale) API Management Platform (AMP) before 2.0.0
would permit creation of an access token without a client secret. An
attacker could use this flaw to circumvent authentication controls and gain
access to restricted APIs. NOTE: some sources have a typo in which
CVE-2017-7512 maps to an OpenVPN vulnerability. The proper CVE ID for that
OpenVPN vulnerability is CVE-2017-7521. Specifically, CVE-2017-7521 is the
correct CVE ID for TWO closely related findings in OpenVPN. Any source that
lists BOTH CVE-2017-7512 and CVE-2017-7521 for OpenVPN should have listed
ONLY CVE-2017-7521.
Author | Note |
---|---|
mdeslaur | This CVE is for Red Hat 3scale, not openvpn |
www.openwall.com/lists/oss-security/2017/06/21/6
community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
launchpad.net/bugs/cve/CVE-2017-7512
nvd.nist.gov/vuln/detail/CVE-2017-7512
security-tracker.debian.org/tracker/CVE-2017-7512
ubuntu.com/security/notices/USN-3339-1
www.cve.org/CVERecord?id=CVE-2017-7512
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.6 Medium
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
70.0%