CVE Vulnerabilities

CVE-2022-2447

Use of a Key Past its Expiration Date

Published: Sep 01, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.6 MODERATE
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.

Weakness

The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.

Affected Software

NameVendorStart VersionEnd Version
KeystoneOpenstack- (including)- (including)
KeystoneUbuntubionic*
KeystoneUbuntuesm-infra/bionic*
KeystoneUbuntuesm-infra/focal*
KeystoneUbuntuesm-infra/xenial*
KeystoneUbuntufocal*
KeystoneUbuntujammy*
KeystoneUbuntukinetic*
KeystoneUbuntulunar*
KeystoneUbuntumantic*
KeystoneUbuntuoracular*
KeystoneUbuntutrusty*
KeystoneUbuntuxenial*

Potential Mitigations

References