The image build process for the overcloud images in Red Hat OpenStack Platform 8.0 (Liberty) director and Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) director (aka overcloud-full) use a default root password of ROOTPW, which allows attackers to gain access via unspecified vectors.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-1222.html | Vendor Advisory |
https://access.redhat.com/security/vulnerabilities/2359821 | Vendor Advisory |
https://rhn.redhat.com/errata/RHSA-2016-1223.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Aug 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* |
Information
Published : 2016-06-30 16:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-4474
Mitre link : CVE-2016-4474
CVE.ORG link : CVE-2016-4474
JSON object : View
Products Affected
redhat
- openstack