First published: Tue Mar 27 2018(Updated: )
aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hashicorp Terraform | <=1.12.0 | |
go/github.com/hashicorp/terraform-provider-aws | <1.14.0 | 1.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2018-9057.
The severity level of CVE-2018-9057 is critical with a severity value of 9.8.
The affected software is HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0.
The CWE ID of CVE-2018-9057 is 332.
An attacker can exploit CVE-2018-9057 by leveraging an IAM account that was provisioned with a weak password.