CVE-2022-37397
The software is vulnerable when using LDAP-based authentication in YCQL with Microsoft’s Active Directory
Severity Score
9.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
An issue was discovered in the YugabyteDB 2.6.1 when using LDAP-based authentication in YCQL with Microsoft’s Active Directory. When anonymous or unauthenticated LDAP binding is enabled, it allows bypass of authentication with an empty password.
Se ha detectado un problema en YugabyteDB versión 2.6.1, cuando es usada la autenticación basada en LDAP en YCQL con el Directorio Activo de Microsoft. Cuando es habilitada la vinculación anónima o no autenticada de LDAP, permite omitir la autenticación con una contraseña vacía.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-08-03 CVE Reserved
- 2022-08-12 CVE Published
- 2024-03-04 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-16: Configuration
- CWE-287: Improper Authentication
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Yugabyte Search vendor "Yugabyte" | Yugabytedb Search vendor "Yugabyte" for product "Yugabytedb" | 2.6.1 Search vendor "Yugabyte" for product "Yugabytedb" and version "2.6.1" | - |
Affected
|