CVE Vulnerabilities

CVE-2020-10755

Insufficiently Protected Credentials

Published: Jun 10, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the connection_info element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another users volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

NameVendorStart VersionEnd Version
Openstack-cinderRedhat*14.1.0 (excluding)
Openstack-cinderRedhat15.0.0 (including)15.2.0 (excluding)
Openstack-cinderRedhat16.0.0 (including)16.1.0 (excluding)
Red Hat OpenStack Platform 13.0 (Queens)RedHatopenstack-cinder-1:12.0.10-19.el7ost*
Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUSRedHatopenstack-cinder-1:12.0.10-19.el7ost*
Red Hat OpenStack Platform 16.1RedHatopenstack-cinder-1:15.3.1-1.20200914173114.00ac80b.el8ost*
CinderUbuntubionic*
CinderUbuntueoan*
CinderUbuntuesm-infra/bionic*
CinderUbuntuesm-infra/focal*
CinderUbuntuesm-infra/xenial*
CinderUbuntufocal*
CinderUbuntugroovy*
CinderUbuntuhirsute*
CinderUbuntuimpish*
CinderUbuntutrusty*
CinderUbuntuupstream*
CinderUbuntuxenial*
Python-os-brickUbuntubionic*
Python-os-brickUbuntueoan*
Python-os-brickUbuntuesm-infra/bionic*
Python-os-brickUbuntuesm-infra/focal*
Python-os-brickUbuntuesm-infra/xenial*
Python-os-brickUbuntufocal*
Python-os-brickUbuntugroovy*
Python-os-brickUbuntuhirsute*
Python-os-brickUbuntuimpish*
Python-os-brickUbuntukinetic*
Python-os-brickUbuntulunar*
Python-os-brickUbuntumantic*
Python-os-brickUbuntutrusty*
Python-os-brickUbuntuupstream*
Python-os-brickUbuntuxenial*

Potential Mitigations

References