Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4474

Опубликовано: 13 июн. 2016
Источник: redhat
CVSS2: 7.4
EPSS Низкий

Описание

The image build process for the overcloud images in Red Hat OpenStack Platform 8.0 (Liberty) director and Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) director (aka overcloud-full) use a default root password of ROOTPW, which allows attackers to gain access via unspecified vectors.

An issue was discovered in the image build process for the overcloud images, as used by director, resulting in all previous images to have a default root password of "rootpw". Remote root access via SSH is disabled by default.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 9 (Mitaka)overcloud-fullAffected
OpenStack 7.0 Director for RHEL 7overcloud-fullFixedRHSA-2016:122313.06.2016
Red Hat OpenStack Platform 8.0 (Liberty) directorrhosp-director-imagesFixedRHSA-2016:122213.06.2016

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1342412overcloud-full: Default root password set

EPSS

Процентиль: 29%
0.00108
Низкий

7.4 High

CVSS2

Связанные уязвимости

CVSS3: 8.8
nvd
больше 9 лет назад

The image build process for the overcloud images in Red Hat OpenStack Platform 8.0 (Liberty) director and Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) director (aka overcloud-full) use a default root password of ROOTPW, which allows attackers to gain access via unspecified vectors.

CVSS3: 8.8
github
больше 3 лет назад

The image build process for the overcloud images in Red Hat OpenStack Platform 8.0 (Liberty) director and Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) director (aka overcloud-full) use a default root password of ROOTPW, which allows attackers to gain access via unspecified vectors.

EPSS

Процентиль: 29%
0.00108
Низкий

7.4 High

CVSS2