CVE-2020-8632
Published: 5 February 2020
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
Notes
Author | Note |
---|---|
ccdm94 | This CVE has been patched in Xenial ESM. The patch, however, has been added only to the updates pocket, and since cloud-init is only used during first boot (pulling from updates), there should not be a need to add this to the security pocket. |
Priority
Status
Package | Release | Status |
---|---|---|
cloud-init Launchpad, Ubuntu, Debian |
bionic |
Released
(20.2-45-g5f7825e2-0ubuntu1~18.04.1)
|
eoan |
Ignored
(end of life)
|
|
focal |
Released
(20.1-10-g71af48df-0ubuntu5)
|
|
groovy |
Released
(19.4-56-g06e324ff-0ubuntu1)
|
|
hirsute |
Released
(21.1-19-gbad84ad4-0ubuntu2)
|
|
impish |
Released
(21.3-1-g6803368d-0ubuntu3)
|
|
jammy |
Released
(21.4-25-g039c40f9-0ubuntu1~22.04.1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(20.1)
|
|
xenial |
Ignored
(patched version in updates pocket)
|
|
Patches: upstream: https://github.com/canonical/cloud-init/commit/42788bf24a1a0a5421a2d00a7f59b59e38ba1a14 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |