Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-16889


Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.


Published

2019-01-28T14:29:00.220

Last Modified

2024-11-21T03:53:32.573

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-532
  • Type: Secondary
    CWE-20
    CWE-200
    CWE-312

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat ceph ≤ 13.2.4 Yes

References