7.4
CVSSv3

CVE-2021-3563

Published: 26/08/2022 Updated: 21/01/2024
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openstack keystone

debian debian linux 10.0

debian debian linux 11.0

redhat openstack platform 16.1

redhat openstack platform 13.0

redhat openstack platform 10.0

redhat openstack platform 16.2

Vendor Advisories

Debian Bug report logs - #989998 keystone: CVE-2021-3563 Package: src:keystone; Maintainer for src:keystone is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 17 Jun 2021 13:51:02 UTC Severity: important Tags: security, upstream Found in version ...
Keystone only verifies part of the secret - the first 72 characters Additional complexity is ignored, giving users an inflated sense of security Default length of a secret seems to be 86 characters While brute forcing at this scale is out of reach for many attackers, the state of the art is constantly evolving ...