etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users passwords with little computational effort.
The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Etcd | Redhat | 3.3.0 (including) | 3.3.23 (excluding) | 
| Etcd | Redhat | 3.4.0 (including) | 3.4.10 (excluding) | 
| Red Hat OpenStack Platform 16.1 | RedHat | etcd-0:3.3.23-1.el8ost | * | 
| Etcd | Ubuntu | bionic | * | 
| Etcd | Ubuntu | focal | * | 
| Etcd | Ubuntu | groovy | * | 
| Etcd | Ubuntu | hirsute | * | 
| Etcd | Ubuntu | impish | * | 
| Etcd | Ubuntu | kinetic | * | 
| Etcd | Ubuntu | lunar | * | 
| Etcd | Ubuntu | mantic | * | 
| Etcd | Ubuntu | oracular | * | 
| Etcd | Ubuntu | trusty | * | 
| Etcd | Ubuntu | upstream | * | 
| Etcd | Ubuntu | xenial | * | 
A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:
Depending on the threat model, the password policy may include several additional attributes.
See NIST 800-63B [REF-1053] for further information on password requirements.