CVE-2020-8631 — Use of Insufficiently Random Values in Cloud-init
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 70.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 5
Latest updateMay 24
Description
cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages3 packages
Also affects: Debian Linux 8.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3Microsoft▶
cloud-init through 19.4 relies on Mersenne Twister for a random password which makes it easier for attackers to predict passwords because rand_str in cloudinit/util.py calls the random.choice function↗2020-02-11
Debian▶
CVE-2020-8631: cloud-init - cloud-init through 19.4 relies on Mersenne Twister for a random password, which ...↗2020
💬Community
3Bugzilla▶
CVE-2020-8631 cloud-init: Use of random.choice when generating random password [fedora-all]↗2020-02-05
Bugzilla
▶