Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-12440 : What You Need to Know

Learn about CVE-2017-12440, a vulnerability in Openstack Ocata and Newton versions allowing remote authenticated users to obtain Keystone tokens and perform unauthorized actions by exploiting trust IDs.

Openstack Ocata and Newton versions prior to change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 are vulnerable due to a flaw in the way Aodh is packaged. This vulnerability allows remote authenticated users to obtain a Keystone token and perform certain actions by exploiting trust IDs.

Understanding CVE-2017-12440

A vulnerability in Openstack Ocata and Newton versions allows remote authenticated users to gain unauthorized access.

What is CVE-2017-12440?

In Openstack Ocata and Newton versions, a vulnerability in Aodh's packaging allows remote authenticated users to obtain a Keystone token and perform unauthorized actions by exploiting trust IDs.

The Impact of CVE-2017-12440

This vulnerability enables remote authenticated users to access Keystone tokens and perform unauthorized actions within affected systems.

Technical Details of CVE-2017-12440

Openstack Ocata and Newton versions are susceptible to exploitation due to a flaw in Aodh's packaging.

Vulnerability Description

Aodh in Openstack Ocata and Newton versions fails to verify trust IDs when creating alarm actions with the trust+http scheme, allowing unauthorized access.

Affected Systems and Versions

        Openstack Ocata and Newton versions before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1

Exploitation Mechanism

        Remote authenticated users with knowledge of trust IDs where Aodh is the trustee can exploit the vulnerability by adding an alarm action with the trust+http scheme.

Mitigation and Prevention

Steps to address and prevent the CVE-2017-12440 vulnerability.

Immediate Steps to Take

        Apply patches provided by the vendor to fix the vulnerability.
        Monitor and restrict access to trust IDs within the system.

Long-Term Security Practices

        Regularly update and patch Openstack installations to prevent vulnerabilities.
        Implement access controls and monitoring mechanisms to detect unauthorized activities.

Patching and Updates

        Install the necessary patches and updates provided by Openstack to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now