First published: Tue Jan 28 2020(Updated: )
A flaw was found in the ceph-ansible playbook where it contained hardcoded passwords that were being used as default passwords while deploying Ceph services. Any authenticated attacker can abuse this flaw to brute-force Ceph deployments, and gain administrator access to Ceph clusters via the Ceph dashboard to initiate read, write, and delete Ceph clusters and also modify Ceph cluster configurations. Versions before ceph-ansible 6.0.0alpha1 are affected.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ceph Ceph-ansible | <=5.0.3 | |
redhat/ceph-ansible | <6.0.0 | 6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1716 is a vulnerability found in the ceph-ansible playbook that contains hardcoded passwords used as default passwords during Ceph deployments.
The severity of CVE-2020-1716 is critical with a CVSS score of 8.8.
CVE-2020-1716 affects Ceph Ceph-ansible versions up to and including 5.0.3.
An authenticated attacker can exploit CVE-2020-1716 by brute-forcing Ceph deployments and gaining administrator access to Ceph clusters using the hardcoded default passwords.
Yes, the fix for CVE-2020-1716 is available in version 6.0.0 of redhat/ceph-ansible.