CVE-2020-10736
Publication date 22 June 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
Status
Package | Ubuntu Release | Status |
---|---|---|
ceph | ||
20.04 LTS focal |
Fixed 15.2.7-0ubuntu0.20.04.2
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
mdeslaur
introduced in 15.2.0 fixed in 15.2.3-0ubuntu0.20.04.1 in focal-updates, but not yet in security pocket.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.0 · High |
Attack vector | Adjacent |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4706-1
- Ceph vulnerabilities
- 28 January 2021