5.2
CVSSv2

CVE-2020-10736

Published: 22/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5.2 | Impact Score: 6.4 | Exploitability Score: 5.1
CVSS v3 Base Score: 8 | Impact Score: 5.9 | Exploitability Score: 2.1
VMScore: 463
Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

An authorization bypass vulnerability was found in Ceph versions 15.2.0 prior to 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linuxfoundation ceph

Vendor Advisories

An authorization bypass vulnerability was found in Ceph versions 1520 and 1521, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks ...