CVE Vulnerabilities

CVE-2020-15136

Improper Authentication

Published: Aug 06, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS 2.x
5.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the –endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
EtcdRedhat3.3.0 (including)3.3.23 (excluding)
EtcdRedhat3.4.0 (including)3.4.10 (excluding)
Red Hat OpenShift Container Platform 4.8RedHatopenshift4/ose-etcd:v4.8.0-202106152230.p0.git.aefa6bf.assembly.stream*
Red Hat OpenStack Platform 16.1RedHatetcd-0:3.3.23-1.el8ost*
EtcdUbuntubionic*
EtcdUbuntufocal*
EtcdUbuntugroovy*
EtcdUbuntuhirsute*
EtcdUbuntuimpish*
EtcdUbuntukinetic*
EtcdUbuntulunar*
EtcdUbuntumantic*
EtcdUbuntuoracular*
EtcdUbuntuplucky*
EtcdUbuntutrusty*
EtcdUbuntuupstream*
EtcdUbuntuxenial*

Potential Mitigations

References