CVE-2020-15136
Improper authentication in etcd
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag. This has been fixed in versions 3.4.10 and 3.3.23 with improved documentation and deprecation of the functionality.
En ectd anterior a las versiones 3.4.10 y 3.3.23, la autenticación TLS de la puerta de enlace solo se aplica a los endpoints detectados en los registros SRV de DNS. Cuando se inicia una puerta de enlace, la autenticación TLS solo se intentará en los endpoints identificados en los registros SRV de DNS para un dominio determinado, lo que ocurre en la función discoverEndpoints. No se lleva a cabo la autenticación contra los endpoints proporcionados en el flag --endpoints. Esto se ha corregido en las versiones 3.4.10 y 3.3.23 con documentación mejorada y degradación de la funcionalidad
A flaw was found in etcd. The gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-06-25 CVE Reserved
- 2020-08-06 CVE Published
- 2024-06-10 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-306: Missing Authentication for Critical Function
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md | Broken Link | |
https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Etcd Search vendor "Redhat" for product "Etcd" | >= 3.3.0 < 3.3.23 Search vendor "Redhat" for product "Etcd" and version " >= 3.3.0 < 3.3.23" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Etcd Search vendor "Redhat" for product "Etcd" | >= 3.4.0 < 3.4.10 Search vendor "Redhat" for product "Etcd" and version " >= 3.4.0 < 3.4.10" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 32 Search vendor "Fedoraproject" for product "Fedora" and version "32" | - |
Affected
|