Replay Attack Vulnerability in Ceph Client Authentication Protocol by Ceph
CVE-2018-1128

7.5HIGH

Key Information:

Vendor
Red Hat
Status
Vendor
CVE Published:
10 July 2018

Summary

The Ceph software's cephx authentication protocol is exposed to a serious flaw due to inadequate verification of ceph clients. This vulnerability enables an attacker with access to the ceph cluster network to intercept and replay authentication requests. By capturing packets, the adversary could impersonate legitimate ceph clients, potentially gaining unauthorized access to ceph services and executing actions permitted within the environment. The flaw affects various branches, including master, mimic, luminous, and jewel, raising significant security concerns.

Affected Version(s)

ceph All versions in branches master, mimic, luminous and jewel

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.