etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
References
Configurations
History
07 Nov 2023, 03:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
21 Nov 2022, 20:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* | |
First Time |
Fedoraproject
Fedoraproject fedora |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/ - Mailing List, Third Party Advisory |
04 Jan 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-08-06 22:15
Updated : 2023-12-10 13:27
NVD link : CVE-2020-15115
Mitre link : CVE-2020-15115
CVE.ORG link : CVE-2020-15115
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- etcd
CWE
CWE-521
Weak Password Requirements