CVE-2021-20288

EUVD-2021-7716
An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys, allowing key reuse. An attacker who can request a global_id can exploit the ability of any user to request a global_id previously associated with another user, as ceph does not force the reuse of old keys to generate new ones. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
Affected Products (NVD)
VendorProductVersion
linuxfoundationceph
𝑥
< 14.2.21
redhatceph_storage
4.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ceph
bookworm
16.2.11+ds-2
fixed
bullseye
14.2.21-1
fixed
sid
18.2.4+ds-7
fixed
stretch
no-dsa
trixie
18.2.4+ds-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ceph
bionic
ignored
focal
Fixed 15.2.12-0ubuntu0.20.04.1
released
groovy
Fixed 15.2.12-0ubuntu0.20.10.1
released
hirsute
Fixed 16.2.6-0ubuntu0.21.04.2
released
impish
Fixed 16.2.1-0ubuntu1
released
jammy
Fixed 16.2.1-0ubuntu1
released
trusty
ignored
xenial
ignored