First published: Mon Nov 19 2018(Updated: )
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/go.etcd.io/etcd | <0.5.0-alpha.5.0.20190108173120-83c051b701d3 | 0.5.0-alpha.5.0.20190108173120-83c051b701d3 |
go/go.etcd.io/etcd/v3 | >=3.3.0<3.3.11 | 3.3.11 |
go/go.etcd.io/etcd/v3 | >=3.2.0<3.2.26 | 3.2.26 |
redhat/etcd | <3.2.26 | 3.2.26 |
redhat/etcd | <3.3.11 | 3.3.11 |
etcd | >=3.2.0<3.2.26 | |
etcd | >=3.3.0<3.3.11 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Fedora | =30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16886 is a vulnerability in etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 that allows improper authentication when role-based access control (RBAC) is used and client-cert-auth is enabled.
CVE-2018-16886 has a severity score of 8.1 (High).
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are affected by CVE-2018-16886.
To fix CVE-2018-16886, update your etcd installation to version 3.2.26 or 3.3.11 depending on your current version.
You can find more information about CVE-2018-16886 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2018-16886), [GitHub Pull Request](https://github.com/etcd-io/etcd/pull/10366), [GitHub Commit](https://github.com/etcd-io/etcd/commit/0191509637546621d6f2e18e074e955ab8ef374d).