etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users passwords with little computational effort.
The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Etcd | Redhat | 3.3.0 (including) | 3.3.23 (excluding) |
Etcd | Redhat | 3.4.0 (including) | 3.4.10 (excluding) |
Red Hat OpenStack Platform 16.1 | RedHat | etcd-0:3.3.23-1.el8ost | * |
Etcd | Ubuntu | bionic | * |
Etcd | Ubuntu | groovy | * |
Etcd | Ubuntu | hirsute | * |
Etcd | Ubuntu | impish | * |
Etcd | Ubuntu | kinetic | * |
Etcd | Ubuntu | lunar | * |
Etcd | Ubuntu | mantic | * |
Etcd | Ubuntu | trusty | * |
Etcd | Ubuntu | upstream | * |
Etcd | Ubuntu | xenial | * |
A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:
Depending on the threat model, the password policy may include several additional attributes.
See NIST 800-63B [REF-1053] for further information on password requirements.