#VU27606 Missing Required Cryptographic Step in OpenStack Keystone - CVE-2020-12692


| Updated: 2021-10-06

Vulnerability identifier: #VU27606

Vulnerability risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-12692

CWE-ID: CWE-325

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OpenStack Keystone
Client/Desktop applications / Other client software

Vendor: Openstack

Description

The vulnerability allows a remote attacker to intercept and decrypt sensitive information.

The vulnerability exists due to the EC2 API does not have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Mitigation
Install update from vendor's website.

Vulnerable software versions

OpenStack Keystone: 8.0.0 - 2015.1.4


External links
https://bugs.launchpad.net/keystone/+bug/1872737
https://www.openwall.com/lists/oss-security/2020/05/06/4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability