Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical cloud-init vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv3
CVE-2018-10896
The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ss...
Canonical Cloud-init
5.5
CVSSv3
CVE-2021-3429
When instructing cloud-init to set a random password for a new user account, versions prior to 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.
Canonical Cloud-init
5.5
CVSSv3
CVE-2020-8631
cloud-init up to and including 19.4 relies on Mersenne Twister for a random password, which makes it easier for malicious users to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
Canonical Cloud-init
Opensuse Leap 15.1
Debian Debian Linux 8.0
5.5
CVSSv3
CVE-2020-8632
In cloud-init up to and including 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for malicious users to guess passwords.
Canonical Cloud-init
Opensuse Leap 15.1
Debian Debian Linux 8.0
5.5
CVSSv3
CVE-2022-2084
Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.
Canonical Cloud-init
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 21.10
Canonical Ubuntu Linux 22.04
5.5
CVSSv3
CVE-2023-1786
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 22.10
Canonical Ubuntu Linux 23.04
Canonical Cloud-init
Fedoraproject Fedora 38
8.8
CVSSv3
CVE-2012-6639
An privilege elevation vulnerability exists in Cloud-init prior to 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.
Canonical Cloud-init
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Suse Linux Enterprise Server 11
5.1
CVSSv3
CVE-2019-0816
A security feature bypass exists in Azure SSH Keypairs, due to a change in the provisioning logic for some Linux images that use cloud-init, aka 'Azure SSH Keypairs Security Feature Bypass Vulnerability'.
Canonical Ubuntu Linux 18.04
1 Article
6.8
CVSSv3
CVE-2020-11933
cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass inten...
Canonical Snapd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
5.9
CVSSv3
CVE-2017-10600
ubuntu-image 1.0 prior to 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd direct...
Canonical Ubuntu-image 1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started