CVE-2020-15115

etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

History

21 Nov 2022, 20:36

Type Values Removed Values Added
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ - Mailing List, Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Information

Published : 2020-08-06 22:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-15115

Mitre link : CVE-2020-15115

CVE.ORG link : CVE-2020-15115


JSON object : View

Products Affected

redhat

  • etcd

fedoraproject

  • fedora
CWE
CWE-521

Weak Password Requirements