Vulnerability Details : CVE-2020-1759
A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.
Products affected by CVE-2020-1759
- cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1759
0.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1759
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
6.4
|
MEDIUM | CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N |
1.2
|
5.2
|
Red Hat, Inc. | |
6.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N |
1.6
|
5.2
|
NIST |
CWE ids for CVE-2020-1759
-
Nonces should be used for the present occasion and only once.Assigned by: secalert@redhat.com (Primary)
-
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2020-1759
-
https://security.gentoo.org/glsa/202105-39
Ceph: Multiple vulnerabilities (GLSA 202105-39) — Gentoo securityThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759
1811712 – (CVE-2020-1759) CVE-2020-1759 ceph: secure mode of msgr2 breaks both confidentiality and integrity aspects for long-lived sessionsIssue Tracking;Patch;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/
[SECURITY] Fedora 31 Update: ceph-14.2.9-1.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
Jump to