CVE-2017-1000256 — Improper Certificate Validation in Redhat Libvirt
Severity
8.1HIGHNVD
EPSS
0.9%
top 24.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 31
Latest updateMay 13
Description
libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 9.0
🔴Vulnerability Details
4📋Vendor Advisories
4Microsoft▶
libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.↗2017-10-10
Debian▶
CVE-2017-1000256: libvirt - libvirt version 2.3.0 and later is vulnerable to a bad default configuration of ...↗2017
💬Community
3Bugzilla▶
CVE-2017-1000256 mingw-libvirt: libvirt: TLS certificate verification disabled for clients [fedora-all]↗2017-10-18
Bugzilla
▶