CVE Vulnerabilities

CVE-2020-8632

Weak Password Requirements

Published: Feb 05, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
8.1 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.

Weakness

The product does not require that users should have strong passwords.

Affected Software

NameVendorStart VersionEnd Version
Cloud-initCanonical*19.4 (including)
Red Hat Enterprise Linux 7RedHatcloud-init-0:19.4-7.el7*
Red Hat Enterprise Linux 8RedHatcloud-init-0:19.4-11.el8*
Cloud-initUbuntubionic*
Cloud-initUbuntudevel*
Cloud-initUbuntueoan*
Cloud-initUbuntuesm-infra/bionic*
Cloud-initUbuntuesm-infra/focal*
Cloud-initUbuntuesm-infra/xenial*
Cloud-initUbuntufocal*
Cloud-initUbuntugroovy*
Cloud-initUbuntuhirsute*
Cloud-initUbuntuimpish*
Cloud-initUbuntujammy*
Cloud-initUbuntutrusty*
Cloud-initUbuntuupstream*
Cloud-initUbuntuxenial*

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References