// For flags

CVE-2022-26779

Apache Cloudstack insecure random number generation affects project email invitation

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Apache CloudStack prior to 4.16.1.0 used insecure random number generation for project invitation tokens. If a project invite is created based only on an email address, a random token is generated. An attacker with knowledge of the project ID and the fact that the invite is sent, could generate time deterministic tokens and brute force attempt to use them prior to the legitimate receiver accepting the invite. This feature is not enabled by default, the attacker is required to know or guess the project ID for the invite in addition to the invitation token, and the attacker would need to be an existing authorized user of CloudStack.

Apache CloudStack versiones anteriores a 4.16.1.0, usaba una generación no segura de números aleatorios para los tokens de invitación a proyectos. Si se crea una invitación a un proyecto basándose únicamente en una dirección de correo electrónico, es generado un token aleatorio. Un atacante con conocimiento del ID del proyecto y el hecho de que la invitación es enviada, podría generar tokens deterministas en el tiempo e intentar por fuerza bruta usarlos antes de que el receptor legítimo acepte la invitación. Esta función no está habilitada por defecto, el atacante debe conocer o adivinar el ID del proyecto para la invitación, además del token de invitación, y el atacante tendría que ser un usuario autorizado existente de CloudStack

*Credits: This issue was reported by Jonathan Leitschuh
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-03-09 CVE Reserved
  • 2022-03-15 CVE Published
  • 2023-11-04 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Cloudstack
Search vendor "Apache" for product "Cloudstack"
< 4.16.1.0
Search vendor "Apache" for product "Cloudstack" and version " < 4.16.1.0"
-
Affected