CVE-2021-3563
Publication date 26 August 2022
Last updated 12 November 2025
Ubuntu priority
Cvss 3 Severity Score
Description
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
Read the notes from the security team
Why is this CVE low priority?
Upstream keystone developers have rated this to be a low severity issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| keystone | 25.10 questing |
Not affected
|
| 25.04 plucky |
Not affected
|
|
| 24.04 LTS noble |
Not affected
|
|
| 22.04 LTS jammy |
Vulnerable
|
|
| 20.04 LTS focal |
Vulnerable
|
|
| 18.04 LTS bionic |
Vulnerable
|
|
| 16.04 LTS xenial |
Vulnerable
|
|
| 14.04 LTS trusty | Not in release |
Notes
mdeslaur
fixed in 21.0.1, 22.0.1, 23.0.0.0rc1 fixed in (2:21.0.1-0ubuntu2) in jammy-updates, but not yet in -security
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |