Description
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
Published: 2019-01-14
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-1756 etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
Github GHSA Github GHSA GHSA-h6xx-pmxh-3wgp go.etcd.io/etcd Authentication Bypass
History

No history.

Subscriptions

Etcd Etcd
Fedoraproject Fedora
Redhat Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Workstation Rhel Extras Other
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T10:32:54.152Z

Reserved: 2018-09-11T00:00:00.000Z

Link: CVE-2018-16886

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-14T19:29:00.243

Modified: 2024-11-21T03:53:32.120

Link: CVE-2018-16886

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-01-11T22:05:00Z

Links: CVE-2018-16886 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses