Lucene search

K
f5F5F5:K33846344
HistoryApr 23, 2021 - 12:00 a.m.

K33846344 : Cloud-init vulnerabilities CVE-2020-8631 and CVE-2020-8632

2021-04-2300:00:00
my.f5.com
9

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.1%

Security Advisory Description

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.

Impact

There is no impact; F5 products are not affected by this vulnerability.