It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2018-07-10 14:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1128
Mitre link : CVE-2018-1128
CVE.ORG link : CVE-2018-1128
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- ceph_storage
- ceph
- enterprise_linux_desktop
- ceph_storage_osd
- enterprise_linux
- enterprise_linux_server
- ceph_storage_mon
debian
- debian_linux
opensuse
- leap