First published: Wed Feb 05 2020(Updated: )
cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical cloud-init | <=19.4 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8631 is a vulnerability in cloud-init through version 19.4 that relies on the Mersenne Twister random number generator, making it easier for attackers to predict passwords.
CVE-2020-8631 affects cloud-init versions up to and including 19.4, where the use of the Mersenne Twister random number generator in generating passwords makes it easier for attackers to predict passwords.
CVE-2020-8631 affects cloud-init versions up to and including 19.4, as well as openSUSE Leap 15.1 and Debian Linux 8.0.
The severity of CVE-2020-8631 is medium, with a severity value of 5.5.
To fix CVE-2020-8631, it is recommended to update cloud-init to a version that addresses the vulnerability.