CVE-2020-8632
Severity
5.5MEDIUM
EPSS
0.1%
top 73.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 5
Latest updateMay 24
Description
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6
Affected Packages3 packages
Also affects: Debian Linux 8.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3Microsoft▶
In cloud-init through 19.4 rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value which makes it easier for attackers to guess passwords.↗2020-02-11
Red Hat▶
cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py↗2020-02-05
Debian▶
CVE-2020-8632: cloud-init - In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwo...↗2020
💬Community
3Bugzilla▶
CVE-2020-8632 cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py↗2020-02-05
Bugzilla▶
CVE-2020-8632 cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py [epel-6]↗2020-02-05
Bugzilla▶
CVE-2020-8632 cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py [fedora-all]↗2020-02-05