First published: Mon Apr 23 2018(Updated: )
puppet-tripleo before versions 5.5.0, 6.2.0 is vulnerable to an access-control flaw in the IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. If SSL is enabled, a malicious user could use these open ports to gain access to unauthorized resources.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack TripleO | =5.5.0 | |
OpenStack TripleO | =6.2.0 | |
Red Hat OpenStack for IBM Power | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9599 is considered to have a high severity due to its potential for exposing unauthorized resources through improperly configured IPtables rules.
To fix CVE-2016-9599, upgrade puppet-tripleo to version 5.5.0 or later, or 6.2.0 or later to ensure proper IPtables management and access control.
Versions of puppet-tripleo before 5.5.0 and 6.2.0 are affected by CVE-2016-9599.
Yes, if SSL is enabled, CVE-2016-9599 can allow malicious users to exploit open ports to access unauthorized resources.
CVE-2016-9599 is an access-control vulnerability related to IPtables rules management.