CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
60.4%
A flaw was found in the Cephx authentication protocol in versions before
15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly
and is then vulnerable to replay attacks in Nautilus. This flaw allows an
attacker with access to the Ceph cluster network to authenticate with the
Ceph service via a packet sniffer and perform actions allowed by the Ceph
service. This issue is a reintroduction of CVE-2018-1128, affecting the
msgr2 protocol. The msgr 2 protocol is used for all communication except
older clients that do not support the msgr2 protocol. The msgr1 protocol is
not affected. The highest threat from this vulnerability is to
confidentiality, integrity, and system availability.
Author | Note |
---|---|
sbeattie | introduced in 321548010578d6ff7bbf2e5ce8a550008b131423 (15.1.0, backported to 14.2.5) |
mdeslaur | fixed in 15.2.7-0ubuntu0.20.04.1 in focal-updates, and 15.2.7-0ubuntu0.20.10.1 in groovy-updates, but not yet in security pocket. |
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
60.4%