Lucene search

K
cveMitreCVE-2018-6185
HistoryJun 07, 2019 - 3:29 p.m.

CVE-2018-6185

2019-06-0715:29:00
CWE-310
mitre
web.nvd.nist.gov
44
cve-2018-6185
cloudera navigator
key trustee kms
unauthorized access
encryption zone keys
apache hadoop kms
acl values

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:P/A:P

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

19.1%

In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is “*” which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.

Affected configurations

Nvd
Node
clouderacloudera_managerMatch5.12.0
OR
clouderacloudera_managerMatch5.12.1
OR
clouderacloudera_managerMatch5.12.2
OR
clouderacloudera_managerMatch5.13.0
OR
clouderacloudera_managerMatch5.13.1
OR
clouderanavigator_key_trustee_kmsMatch5.12.0
OR
clouderanavigator_key_trustee_kmsMatch5.13.0
VendorProductVersionCPE
clouderacloudera_manager5.12.0cpe:2.3:a:cloudera:cloudera_manager:5.12.0:*:*:*:*:*:*:*
clouderacloudera_manager5.12.1cpe:2.3:a:cloudera:cloudera_manager:5.12.1:*:*:*:*:*:*:*
clouderacloudera_manager5.12.2cpe:2.3:a:cloudera:cloudera_manager:5.12.2:*:*:*:*:*:*:*
clouderacloudera_manager5.13.0cpe:2.3:a:cloudera:cloudera_manager:5.13.0:*:*:*:*:*:*:*
clouderacloudera_manager5.13.1cpe:2.3:a:cloudera:cloudera_manager:5.13.1:*:*:*:*:*:*:*
clouderanavigator_key_trustee_kms5.12.0cpe:2.3:a:cloudera:navigator_key_trustee_kms:5.12.0:*:*:*:*:*:*:*
clouderanavigator_key_trustee_kms5.13.0cpe:2.3:a:cloudera:navigator_key_trustee_kms:5.13.0:*:*:*:*:*:*:*

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:P/A:P

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

19.1%

Related for CVE-2018-6185