Description
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7012 | etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort. |
Github GHSA |
GHSA-4993-m7g5-r9hh | etcd has no minimum password length |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T13:08:21.734Z
Reserved: 2020-06-25T00:00:00.000Z
Link: CVE-2020-15115
No data.
Status : Modified
Published: 2020-08-06T22:15:12.093
Modified: 2024-11-21T05:04:51.007
Link: CVE-2020-15115
OpenCVE Enrichment
No data.
EUVD
Github GHSA