2.7 Low
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:L/Au:S/C:P/I:N/A:N
5.7 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.7 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.7%
It was found Ceph versions before 13.2.4 that authenticated ceph users with read only permissions could steal dm-crypt encryption keys used in ceph disk encryption.
CPE | Name | Operator | Version |
---|---|---|---|
redhat:ceph | redhat ceph | lt | 13.2.4 |
[
{
"product": "ceph",
"vendor": "[UNKNOWN]",
"versions": [
{
"status": "affected",
"version": "13.2.4"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
access.redhat.com/errata/RHSA-2019:2538
access.redhat.com/errata/RHSA-2019:2541
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662
ceph.com/releases/13-2-4-mimic-released
lists.debian.org/debian-lts-announce/2019/03/msg00002.html
lists.debian.org/debian-lts-announce/2021/08/msg00013.html
usn.ubuntu.com/4035-1/
More
2.7 Low
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:L/Au:S/C:P/I:N/A:N
5.7 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.7 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.7%