Vulnerability Description
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Cloud-Init | <= 19.4 |
| Opensuse | Leap | 15.1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.htmlMailing ListThird Party Advisory
- https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795Issue TrackingPatchThird Party Advisory
- https://github.com/canonical/cloud-init/pull/189PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/02/msg00021.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.htmlMailing ListThird Party Advisory
- https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795Issue TrackingPatchThird Party Advisory
- https://github.com/canonical/cloud-init/pull/189PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/02/msg00021.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2020-8632?
CVE-2020-8632 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
How severe is CVE-2020-8632?
CVE-2020-8632 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8632?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Cloud-Init, Opensuse Leap, Debian Debian Linux.