#VU27606 Missing Required Cryptographic Step

Published: 2020-05-07 | Updated: 2021-10-06

Vulnerability identifier: #VU27606

Vulnerability risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12692


Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OpenStack Keystone
Client/Desktop applications / Other client software

Vendor: Openstack


The vulnerability allows a remote attacker to intercept and decrypt sensitive information.

The vulnerability exists due to the EC2 API does not have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.

Install update from vendor's website.

Vulnerable software versions

OpenStack Keystone: 8.0.0 - 2015.1.4


External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

Latest bulletins with this vulnerability