9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
71.5%
It was discovered that etcd leaked credentials when debugging
was enabled. This allowed remote attackers to discover etcd
authentication credentials and possibly escalate privileges on
systems using etcd.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 23.04 | noarch | etcd-server | < 3.4.23-4ubuntu0.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | etcd-client | < 3.4.23-4ubuntu0.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | etcd-client-dbgsym | < 3.4.23-4ubuntu0.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | etcd-server-dbgsym | < 3.4.23-4ubuntu0.1 | UNKNOWN |
Ubuntu | 23.04 | noarch | golang-etcd-server-dev | < 3.4.23-4ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | etcd-server | < 3.3.25+dfsg-7ubuntu0.22.10.2 | UNKNOWN |
Ubuntu | 22.10 | noarch | etcd | < 3.3.25+dfsg-7ubuntu0.22.10.2 | UNKNOWN |
Ubuntu | 22.10 | noarch | etcd-client | < 3.3.25+dfsg-7ubuntu0.22.10.2 | UNKNOWN |
Ubuntu | 22.10 | noarch | etcd-client-dbgsym | < 3.3.25+dfsg-7ubuntu0.22.10.2 | UNKNOWN |
Ubuntu | 22.10 | noarch | etcd-server-dbgsym | < 3.3.25+dfsg-7ubuntu0.22.10.2 | UNKNOWN |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 High
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
71.5%