CVE-2021-28235
Published: 4 April 2023
Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.
Priority
Status
Package | Release | Status |
---|---|---|
etcd Launchpad, Ubuntu, Debian |
bionic |
Released
(3.2.17+dfsg-1ubuntu0.1+esm2)
Available with Ubuntu Pro |
focal |
Released
(3.2.26+dfsg-6ubuntu0.2+esm1)
Available with Ubuntu Pro |
|
jammy |
Released
(3.3.25+dfsg-7ubuntu0.22.04.1+esm1)
Available with Ubuntu Pro |
|
kinetic |
Released
(3.3.25+dfsg-7ubuntu0.22.10.2)
|
|
lunar |
Released
(3.4.23-4ubuntu0.1)
|
|
trusty |
Ignored
(end of standard support)
|
|
xenial |
Needs triage
|
|
upstream |
Released
(v.3.4.25)
|
|
Patches: upstream: https://github.com/etcd-io/etcd/commit/8b1cd036ffa83204b29f53bd74fae190e9187781 (v3.5.8) upstream: https://github.com/etcd-io/etcd/commit/3618ab4b07cc9c0883b6a642da198877e25d612b (v.3.4.25) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28235
- https://github.com/etcd-io/etcd/pull/15648
- https://github.com/etcd-io/etcd/pull/15655
- https://github.com/etcd-io/etcd/commit/1f746597ea6ce9f0a4554108bc853f256e150b0b (v3.4.25)
- https://github.com/etcd-io/etcd/commit/3618ab4b07cc9c0883b6a642da198877e25d612b (v3.4.25)
- https://ubuntu.com/security/notices/USN-6189-1
- NVD
- Launchpad
- Debian