
Cloud Vulnerability DB
A community-led vulnerabilities database
A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2. The vulnerability was introduced in commit fe387e02b11d and affects all Ceph versions from v14.1.1. The issue was discovered in 2019 and publicly disclosed in April 2020 (Openwall, NVD).
The vulnerability allows an attacker to forge authentication tags and potentially manipulate data by leveraging the reuse of a nonce in a session. The issue has a CVSS v3.1 base score of 6.8 (Medium) with the vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N. The vulnerability is classified under CWE-330 (Use of Insufficiently Random Values) and CWE-323 (Reusing a Nonce, Key Pair in Encryption) (NVD).
Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. The vulnerability affects the secure mode of the messenger v2 protocol, compromising both confidentiality and integrity aspects for long-lived sessions (Openwall, Red Hat Bugzilla).
The vulnerability was fixed in Ceph versions 15.2.1 and 14.2.9. Patches were merged upstream via PR 34482. Red Hat Product Security noted that no effective mitigation options were available that met their criteria for ease of use, deployment, and stability (Red Hat Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."