CVE-2015-1842Hard-coded Credentials in Redhat Openstack

Severity
10.0CRITICALNVD
EPSS
4.8%
top 10.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 10
Latest updateMay 17

Description

The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-x735-34cq-fm2q: The puppet manifests in the Red Hat openstack-puppet-modules package before 20142022-05-17
CVEList
CVE-2015-1842: The puppet manifests in the Red Hat openstack-puppet-modules package before 20142015-04-10

📋Vendor Advisories

1
Red Hat
openstack-puppet-modules: pacemaker configured with default password2015-03-10

💬Community

1
Bugzilla
CVE-2015-1842 openstack-puppet-modules: pacemaker configured with default password2015-03-13
CVE-2015-1842 — Hard-coded Credentials in Redhat | cvebase