Description
Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
Published: 2021-07-28
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-3041 Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
History

No history.

Subscriptions

Replicated Replicated Classic
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:06:10.092Z

Reserved: 2020-03-15T00:00:00.000Z

Link: CVE-2020-10590

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-30T14:15:12.930

Modified: 2024-11-21T04:55:39.207

Link: CVE-2020-10590

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses