First published: Tue Feb 28 2023(Updated: )
### Impact We are incorporating the password policies listed in https://github.com/vantage6/vantage6/issues/59. One measure is that we don't let the user know in case of wrong username/password combination if the username actually exists, to prevent that bots can guess usernames. However, if a wrong password is entered a number of times, the user account is blocked temporarily. This way you could still find out which usernames exist. ### Patches Update to 3.8.0+ ### Workarounds No ### References https://github.com/vantage6/vantage6/issues/59 ### For more information If you have any questions or comments about this advisory: * Email us at [vantage6@iknl.nl](mailto:vantage6@iknl.nl)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/vantage6 | <3.8.0 | 3.8.0 |
Vantage6 | >=3.3.3<3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39228 is a vulnerability in the vantage6 federated learning infrastructure that allows the wrong username/password combination to be checked without informing the user if the username actually exists.
CVE-2022-39228 has a severity level of medium with a score of 6.5.
CVE-2022-39228 affects vantage6 versions between 3.3.3 and 3.8.0.
To fix CVE-2022-39228, update vantage6 to a version beyond 3.8.0.
The CWEs associated with CVE-2022-39228 are CWE-203 and CWE-204.