Canonical Cloud-Init vulnerabilities
9 known vulnerabilities affecting canonical/cloud-init.
Total CVEs
9
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3MEDIUM6
Vulnerabilities
Page 1 of 1
CVE-2024-6174HIGHCVSS 8.8fixed in 25.1.3≥ 0.7.9, < 25.1.32025-06-26
CVE-2024-6174 [HIGH] CWE-287 CVE-2024-6174: When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local I
When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
cvelistv5nvd
CVE-2024-11584MEDIUMCVSS 5.3fixed in 25.1.3≥ 21.3, < 25.1.32025-06-26
CVE-2024-11584 [MEDIUM] CWE-732 CVE-2024-11584: cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default S
cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger hotplug-hook commands.
cvelistv5nvd
CVE-2023-1786MEDIUMCVSS 5.5fixed in 23.1.22023-04-26
CVE-2023-1786 [MEDIUM] CWE-532 CVE-2023-1786: Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use t
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
nvd
CVE-2022-2084MEDIUMCVSS 5.5fixed in 22.32023-04-19
CVE-2022-2084 [MEDIUM] CWE-532 CVE-2022-2084: Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema
Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.
nvd
CVE-2021-3429MEDIUMCVSS 5.5fixed in 21.22023-04-19
CVE-2021-3429 [MEDIUM] CWE-532 CVE-2021-3429: When instructing cloud-init to set a random password for a new user account, versions before 21.2 wo
When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.
nvd
CVE-2020-8632MEDIUMCVSS 5.5≤ 19.42020-02-05
CVE-2020-8632 [MEDIUM] CWE-521 CVE-2020-8632: In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small d
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
nvd
CVE-2020-8631MEDIUMCVSS 5.5≤ 19.42020-02-05
CVE-2020-8631 [MEDIUM] CWE-330 CVE-2020-8631: cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for
cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
nvd
CVE-2012-6639HIGHCVSS 8.8fixed in 0.7.02019-11-25
CVE-2012-6639 [HIGH] CWE-269 CVE-2012-6639: An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted
An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.
nvd
CVE-2018-10896HIGHCVSS 7.1≥ 0.6.2, < 18.4v0.6.22018-08-01
CVE-2018-10896 [HIGH] CWE-321 CVE-2018-10896: The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", d
The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle atta
cvelistv5nvd