CVE-2023-6725

An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*

History

30 Jul 2025, 20:21

Type Values Removed Values Added
First Time Redhat
Redhat openstack Platform
References () https://access.redhat.com/errata/RHSA-2024:2736 - () https://access.redhat.com/errata/RHSA-2024:2736 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:2770 - () https://access.redhat.com/errata/RHSA-2024:2770 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-6725 - () https://access.redhat.com/security/cve/CVE-2023-6725 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249273 - () https://bugzilla.redhat.com/show_bug.cgi?id=2249273 - Vendor Advisory
CPE cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*

Information

Published : 2024-03-15 13:15

Updated : 2025-07-30 20:21


NVD link : CVE-2023-6725

Mitre link : CVE-2023-6725

CVE.ORG link : CVE-2023-6725


JSON object : View

Products Affected

redhat

  • openstack_platform
CWE
CWE-1220

Insufficient Granularity of Access Control