CVE Vulnerabilities

CVE-2020-15136

Improper Authentication

Published: Aug 06, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the –endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Etcd Redhat 3.3.0 (including) 3.3.23 (excluding)
Etcd Redhat 3.4.0 (including) 3.4.10 (excluding)
Etcd Ubuntu bionic *
Etcd Ubuntu groovy *
Etcd Ubuntu hirsute *
Etcd Ubuntu impish *
Etcd Ubuntu kinetic *
Etcd Ubuntu lunar *
Etcd Ubuntu mantic *
Etcd Ubuntu trusty *
Etcd Ubuntu upstream *
Etcd Ubuntu xenial *
Red Hat OpenShift Container Platform 4.8 RedHat openshift4/ose-etcd:v4.8.0-202106152230.p0.git.aefa6bf.assembly.stream *
Red Hat OpenStack Platform 16.1 RedHat etcd-0:3.3.23-1.el8ost *

Potential Mitigations

References