CVE Vulnerabilities

CVE-2018-10896

Use of Hard-coded Cryptographic Key

Published: Aug 01, 2018 | Modified: Nov 21, 2024
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS 2.x
3.6 LOW
AV:L/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
4.6 LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

The default cloud-init configuration, in cloud-init 0.6.2 and newer, included ssh_deletekeys: 0, disabling cloud-inits deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks.

Weakness

The product uses a hard-coded, unchangeable cryptographic key.

Affected Software

NameVendorStart VersionEnd Version
Cloud-initCanonical0.6.2 (including)18.4 (excluding)
Red Hat Enterprise Linux 7RedHatcloud-init-0:19.4-7.el7*
Red Hat Enterprise Linux 8RedHatcloud-init-0:19.4-1.el8.7*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatcloud-init-0:18.5-12.el8_2.3*

Potential Mitigations

References