First published: Tue Aug 06 2024(Updated: )
In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data. Affected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CloudStack | =4.19.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42222 is considered a medium severity vulnerability due to its potential impact on tenant isolation.
To fix CVE-2024-42222, upgrade to Apache CloudStack version 4.19.1.1 or later, which addresses the regression in the network listing API.
CVE-2024-42222 affects users of Apache CloudStack version 4.19.1.0, including domain admin and normal user accounts.
The impact of CVE-2024-42222 includes unauthorized access to network details, compromising tenant isolation.
CVE-2024-42222 can be exploited locally by authorized users to gain unauthorized access to sensitive information.