Red Hat Enterprise Linux OpenStack Platform 7.0/8.0 Image Build Processor 7pk security
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.7 | $0-$5k | 0.00 |
Summary
A vulnerability marked as critical has been reported in Red Hat Enterprise Linux OpenStack Platform 7.0/8.0. This affects an unknown function of the component Image Build Processor. The manipulation leads to 7pk security. This vulnerability is uniquely identified as CVE-2016-4474. The attack can only be initiated within the local network. No exploit exists. You should change the configuration settings.
Details
A vulnerability was found in Red Hat Enterprise Linux OpenStack Platform 7.0/8.0 (Operating System) and classified as critical. This issue affects an unknown code of the component Image Build Processor. The manipulation with an unknown input leads to a 7pk security vulnerability. Using CWE to declare the problem leads to CWE-254. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
The image build process for the overcloud images in Red Hat OpenStack Platform 8.0 (Liberty) director and Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) director (aka overcloud-full) use a default root password of ROOTPW, which allows attackers to gain access via unspecified vectors.
The weakness was disclosed 06/30/2016 (Website). It is possible to read the advisory at rhn.redhat.com. The identification of this vulnerability is CVE-2016-4474 since 05/02/2016. The exploitation is known to be easy. The attack needs to be initiated within the local network. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/26/2022). The attack technique deployed by this issue is T1211 according to MITRE ATT&CK.
It is possible to mitigate the problem by applying the configuration setting .
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.redhat.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.8VulDB Meta Temp Score: 8.7
VulDB Base Score: 8.8
VulDB Temp Score: 8.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: 7pk securityCWE: CWE-254
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: ConfigStatus: 🔍
0-Day Time: 🔍
Timeline
05/02/2016 🔍06/30/2016 🔍
06/30/2016 🔍
07/04/2016 🔍
08/26/2022 🔍
Sources
Vendor: redhat.comAdvisory: RHSA-2016:1222
Status: Not defined
Confirmation: 🔍
CVE: CVE-2016-4474 (🔍)
GCVE (CVE): GCVE-0-2016-4474
GCVE (VulDB): GCVE-100-88547
Entry
Created: 07/04/2016 10:06Updated: 08/26/2022 10:37
Changes: 07/04/2016 10:06 (49), 02/15/2019 15:31 (10), 08/26/2022 10:37 (4)
Complete: 🔍
Cache ID: 216:0BA:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.