CVE-2024-48916Insufficient Verification of Data Authenticity in Ceph

Severity
8.1HIGHNVD
EPSS
0.0%
top 88.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 30

Description

Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2

Affected Packages2 packages

Debianceph/ceph< 16.2.15+ds-0+deb12u1+2
CVEListV5ceph/ceph19.2.3

🔴Vulnerability Details

2
OSV
CVE-2024-48916: Ceph is a distributed object, block, and file storage platform2025-07-30
CVEList
Ceph is vulnerable to authentication bypass through RadosGW2025-07-30

📋Vendor Advisories

4
Microsoft
Ceph is vulnerable to authentication bypass through RadosGW2025-07-08
Ubuntu
Ceph vulnerability2025-01-06
Red Hat
ceph: rhceph-container: Authentication bypass in CEPH RadosGW2024-12-02
Debian
CVE-2024-48916: ceph - Ceph is a distributed object, block, and file storage platform. In versions 19.2...2024