HP Helion Eucalyptus 4.1.x prior to 4.1.2 and HPE Helion Eucalyptus 4.2.x prior to 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
eucalyptus eucalyptus 4.1.1 |
||
eucalyptus eucalyptus 4.2.0 |