CVE Vulnerabilities

CVE-2021-3652

Improper Authentication

Published: Apr 18, 2022 | Modified: Nov 03, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
RedHat/V3
6.5 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
389-ds-basePort389*2.0.7 (excluding)
Red Hat Directory Server 11.4 for RHEL 8RedHatredhat-ds:11-8050020210920153716.d3df4063*
Red Hat Enterprise Linux 7RedHat389-ds-base-0:1.3.10.2-13.el7_9*
Red Hat Enterprise Linux 8RedHat389-ds:1.4-8040020210721074904.96015a92*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHat389-ds:1.4-8020020210819193832.dbc46ba7*
389-ds-baseUbuntuupstream*

Potential Mitigations

References