Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-35733

Опубликовано: 15 янв. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.

A flaw was found in the OTP component of Erlang. The SSL application accepts and trusts invalid X.509 certificate chains. An attacker, able to create a fake certificate chain, could create a man-in-the-middle attack. The highest threat from this vulnerability is to data confidentiality.

Отчет

Red Hat CloudForms 5.10 ships affected erlang-OTP component but the product does not use it in a vulnerable way; therefore, the impact is low. The newer version of CloudForms 5.11 does not include the affected component. Red Hat Ansible Tower 3.6 ships 20.3.8.21 erlang-OTP component but this version never introduced the vulnerability, therefore is not affected. The newer versions of Red Hat Ansible Tower 3.7 and Red Hat Ansible Automation Platform which ships Ansible Tower 3.8 do not include the erlang dependency. All supported releases of Red Hat OpenStack Platform ship the affected Erlang component, however it is only used as a dependency for RabbitMQ and is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5erlangWill not fix
Red Hat Ansible Tower 3erlangNot affected
Red Hat OpenStack Platform 10 (Newton)erlangWill not fix
Red Hat OpenStack Platform 13 (Queens)erlangWill not fix
Red Hat OpenStack Platform 16 (Train)erlangWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1918203erlang: accepts and trusts an invalid X.509 certificate chain

EPSS

Процентиль: 44%
0.0022
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.

CVSS3: 7.5
nvd
около 5 лет назад

An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.

CVSS3: 7.5
debian
около 5 лет назад

An issue was discovered in Erlang/OTP before 23.2.2. The ssl applicati ...

github
больше 3 лет назад

An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.

CVSS3: 7.5
fstec
около 5 лет назад

Уязвимость языка программирования Erlang, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 44%
0.0022
Низкий

7.5 High

CVSS3