CVE-2018-1128

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

References

http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html

http://tracker.ceph.com/issues/24836

http://www.openwall.com/lists/oss-security/2020/11/17/3

http://www.openwall.com/lists/oss-security/2020/11/17/4

https://access.redhat.com/errata/RHSA-2018:2177

https://access.redhat.com/errata/RHSA-2018:2179

https://access.redhat.com/errata/RHSA-2018:2261

https://access.redhat.com/errata/RHSA-2018:2274

https://bugzilla.redhat.com/show_bug.cgi?id=1575866

https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468

https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

https://www.debian.org/security/2018/dsa-4339

Details

Source: MITRE

Published: 2018-07-10

Updated: 2020-11-17

Type: CWE-287

Risk Information

CVSS v2

Base Score: 5.4

Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 5.5

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.6

Severity: HIGH

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
130663EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-2201)NessusHuawei Local Security Checks
critical
125282SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1287-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)NessusSuSE Local Security Checks
high
124358openSUSE Security Update : ceph (openSUSE-2019-1284)NessusSuSE Local Security Checks
high
123329openSUSE Security Update : the Linux Kernel (openSUSE-2019-769)NessusSuSE Local Security Checks
high
122879Debian DLA-1715-1 : linux-4.9 security update (Spectre)NessusDebian Local Security Checks
high
122809SUSE SLED15 / SLES15 Security Update : ceph (SUSE-SU-2019:0586-1)NessusSuSE Local Security Checks
high
120338Fedora 28 : 1:ceph (2018-327707371e)NessusFedora Local Security Checks
high
120118SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2980-1)NessusSuSE Local Security Checks
high
118939Debian DSA-4339-1 : ceph - security updateNessusDebian Local Security Checks
high
117988openSUSE Security Update : the Linux Kernel (openSUSE-2018-1140)NessusSuSE Local Security Checks
high
117800SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2858-1)NessusSuSE Local Security Checks
high
117629SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:2776-1)NessusSuSE Local Security Checks
high
117523openSUSE Security Update : the Linux Kernel (openSUSE-2018-1016)NessusSuSE Local Security Checks
high
112079SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2478-1)NessusSuSE Local Security Checks
high
111635openSUSE Security Update : ceph (openSUSE-2018-854)NessusSuSE Local Security Checks
high
111559Fedora 27 : 1:ceph (2018-8738f5f4a7)NessusFedora Local Security Checks
high
111548SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2193-1)NessusSuSE Local Security Checks
high
111364RHEL 7 : Red Hat Ceph Storage 2.5 (RHSA-2018:2261)NessusRed Hat Local Security Checks
high
111145RHEL 7 : Red Hat Ceph Storage 3.0 (RHSA-2018:2177)NessusRed Hat Local Security Checks
high