Lucene search

K
vulnrichmentApacheVULNRICHMENT:CVE-2024-42222
HistoryAug 07, 2024 - 7:16 a.m.

CVE-2024-42222 Apache CloudStack: Unauthorised Network List Access

2024-08-0707:16:13
CWE-200
apache
github.com
4
apache cloudstack
unauthorised access
network details
tenant isolation
upgrade
vulnerability

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

35.1%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data.

Affected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache CloudStack",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "4.19.1.0"
      }
    ]
  }
]

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

35.1%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-42222