Authentication bypass in Red Hat OpenShift Container Platform - CVE-2016-7075
Published: October 17, 2016 / Updated: October 18, 2016
Vulnerability identifier: #VU1017
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-7075
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Red Hat Inc.
Affected software:
Red Hat OpenShift Container Platform
Red Hat OpenShift Container Platform
Detailed vulnerability description
The vulnerability allows a remote unauthenticated user to bypass authentication on the target system.
The weakness is due to insufficient validation of X.509 client intermediate certificate hostname fields. By sending a specially crafted X.509 certificate to be processed, attackers can avoid authentication and access the system.
Succesful exploitation of the vulnerability may lead to further consequences or attacks.
The weakness is due to insufficient validation of X.509 client intermediate certificate hostname fields. By sending a specially crafted X.509 certificate to be processed, attackers can avoid authentication and access the system.
Succesful exploitation of the vulnerability may lead to further consequences or attacks.
How to mitigate CVE-2016-7075
Update to version 3.4.