CVE Vulnerabilities

CVE-2022-2447

Use of a Key Past its Expiration Date

Published: Sep 01, 2022 | Modified: Nov 21, 2024
CVSS 3.x
6.6
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.6 MODERATE
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.

Weakness

The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.

Affected Software

Name Vendor Start Version End Version
Keystone Openstack - (including) - (including)
Keystone Ubuntu bionic *
Keystone Ubuntu devel *
Keystone Ubuntu esm-infra/bionic *
Keystone Ubuntu esm-infra/xenial *
Keystone Ubuntu focal *
Keystone Ubuntu jammy *
Keystone Ubuntu kinetic *
Keystone Ubuntu lunar *
Keystone Ubuntu mantic *
Keystone Ubuntu noble *
Keystone Ubuntu oracular *
Keystone Ubuntu trusty *
Keystone Ubuntu xenial *

Potential Mitigations

References