Vulnerability identifier: #VU27606
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-325
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OpenStack Keystone
Client/Desktop applications /
Other client software
Vendor: Openstack
Description
The vulnerability allows a remote attacker to intercept and decrypt sensitive information.
The vulnerability exists due to the EC2 API does not have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
Mitigation
Install update from vendor's website.
Vulnerable software versions
OpenStack Keystone: 8.0.0 - 2015.1.4
External links
https://bugs.launchpad.net/keystone/+bug/1872737
https://www.openwall.com/lists/oss-security/2020/05/06/4
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.