CVE Vulnerabilities

CVE-2020-15115

Weak Password Requirements

Published: Aug 06, 2020 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW

etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users passwords with little computational effort.

Weakness

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

Affected Software

Name Vendor Start Version End Version
Etcd Redhat 3.3.0 (including) 3.3.23 (excluding)
Etcd Redhat 3.4.0 (including) 3.4.10 (excluding)
Red Hat OpenStack Platform 16.1 RedHat etcd-0:3.3.23-1.el8ost *
Etcd Ubuntu bionic *
Etcd Ubuntu groovy *
Etcd Ubuntu hirsute *
Etcd Ubuntu impish *
Etcd Ubuntu kinetic *
Etcd Ubuntu lunar *
Etcd Ubuntu mantic *
Etcd Ubuntu trusty *
Etcd Ubuntu upstream *
Etcd Ubuntu xenial *

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References