First published: Wed Oct 12 2016(Updated: )
It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Dashboard | ||
Red Hat OpenShift | =3.1 | |
Red Hat OpenShift | =3.2 | |
Red Hat OpenShift | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7075 has a high severity rating due to its potential to bypass authentication mechanisms.
To mitigate CVE-2016-7075, ensure that you are using the latest versions of Kubernetes or OpenShift that have addressed this vulnerability.
CVE-2016-7075 affects Kubernetes and specific versions of Red Hat OpenShift Enterprise 3.1, 3.2, and 3.3.
An attacker can leverage CVE-2016-7075 to bypass authentication by employing a specially crafted X.509 certificate.
The primary issue with CVE-2016-7075 is the improper validation of X.509 client intermediate certificate host name fields.