Vulnerability Details : CVE-2023-6725
An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information.
Products affected by CVE-2023-6725
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-6725
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 15 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6725
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.6
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L |
1.8
|
4.7
|
Red Hat, Inc. | 2024-03-15 |
6.6
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L |
N/A
|
N/A
|
RedHat-CVE-2023-6725 | 2024-03-15 |
CWE ids for CVE-2023-6725
-
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.Assigned by: secalert@redhat.com (Primary)
References for CVE-2023-6725
-
https://access.redhat.com/errata/RHSA-2024:2736
RHSA-2024:2736 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/security/cve/CVE-2023-6725
CVE-2023-6725- Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=2249273
2249273 – (CVE-2023-6725) CVE-2023-6725 openstack-designate: bind keys are world readable
-
https://access.redhat.com/errata/RHSA-2024:2770
RHSA-2024:2770 - Security Advisory - Red Hat Customer Portal
Jump to