CVE-2020-1759
Published: 13 April 2020
A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(15.2.1-0ubuntu1)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(15.2.1)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/20b7bb685c5ea74c651ca1ea547ac66b0fee7035 upstream: https://github.com/ceph/ceph/commit/dfd1d81cec62e21e21696dc87d4db5f920e51a67 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.8 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N |