// For flags

CVE-2020-7922

Kubernetes Operator generates potentially insecure certificates

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

X.509 certificates generated by the MongoDB Enterprise Kubernetes Operator may allow an attacker with access to the Kubernetes cluster improper access to MongoDB instances. Customers who do not use X.509 authentication, and those who do not use the Operator to generate their X.509 certificates are unaffected. This issue affects MongoDB Enterprise Kubernetes Operator version 1.0, MongoDB Enterprise Kubernetes Operator version 1.1, MongoDB Enterprise Kubernetes Operator version 1.2 versions prior to 1.2.4, MongoDB Enterprise Kubernetes Operator version 1.3 versions prior to 1.3.1, 1.2, 1.4 versions prior to 1.4.4.

Los certificados X.509 generados por el MongoDB Enterprise Kubernetes Operator pueden permitir a un atacante con acceso al clúster de Kubernetes un acceso inapropiado a instancias de MongoDB. Los clientes que no utilizan la autenticación X.509 y aquellos que no usan el Operator para generar sus certificados X.509 están sin afectación. Este problema afecta: MongoDB Inc. MongoDB Enterprise Kubernetes Operator versión 1.0, 1.1, 1.2 versiones anteriores a la 1.2.4, 1.3 versiones anteriores a la 1.3.1, 1.2, 1.4 versiones anteriores a la 1.4.4.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-23 CVE Reserved
  • 2020-04-09 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-295: Improper Certificate Validation
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mongodb
Search vendor "Mongodb"
Mongodb Enterprise Kubernetes Operator
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator"
>= 1.2.0 <= 1.2.4
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator" and version " >= 1.2.0 <= 1.2.4"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb Enterprise Kubernetes Operator
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator"
>= 1.3.0 <= 1.3.1
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator" and version " >= 1.3.0 <= 1.3.1"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb Enterprise Kubernetes Operator
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator"
>= 1.4.0 <= 1.4.4
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator" and version " >= 1.4.0 <= 1.4.4"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb Enterprise Kubernetes Operator
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator"
1.0
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator" and version "1.0"
-
Affected
Mongodb
Search vendor "Mongodb"
Mongodb Enterprise Kubernetes Operator
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator"
1.1
Search vendor "Mongodb" for product "Mongodb Enterprise Kubernetes Operator" and version "1.1"
-
Affected