CVE Vulnerabilities

CVE-2020-15115

Weak Password Requirements

Published: Aug 06, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users passwords with little computational effort.

Weakness

The product does not require that users should have strong passwords.

Affected Software

NameVendorStart VersionEnd Version
EtcdRedhat3.3.0 (including)3.3.23 (excluding)
EtcdRedhat3.4.0 (including)3.4.10 (excluding)
Red Hat OpenStack Platform 16.1RedHatetcd-0:3.3.23-1.el8ost*
EtcdUbuntubionic*
EtcdUbuntufocal*
EtcdUbuntugroovy*
EtcdUbuntuhirsute*
EtcdUbuntuimpish*
EtcdUbuntukinetic*
EtcdUbuntulunar*
EtcdUbuntumantic*
EtcdUbuntuoracular*
EtcdUbuntuplucky*
EtcdUbuntutrusty*
EtcdUbuntuupstream*
EtcdUbuntuxenial*

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References