Predictable Password Generation in Cloud-Init by Canonical
CVE-2020-8631
5.5MEDIUM
Summary
The vulnerability arises from the use of the Mersenne Twister algorithm in Cloud-Init versions up to 19.4, which produces predictable random numbers for password generation. This flaw allows attackers to forecast the generated passwords, thereby compromising security. The function rand_str in the cloudinit/util.py file employs random.choice, leading to insufficient randomness and exposing systems to potential unauthorized access. Users are highly encouraged to update to secure versions to mitigate this risk.
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved