CVE-2021-3563
Python vulnerability analysis and mitigation

Overview

A security vulnerability (CVE-2021-3563) was discovered in OpenStack Keystone, where only the first 72 characters of an application secret are verified during authentication. This limitation allows attackers to bypass password complexity requirements that administrators may be relying on for security. The vulnerability was reported in 2020 and affects multiple versions of the OpenStack Keystone authentication service (Launchpad Bug, Debian Security).

Technical details

The vulnerability stems from the bcrypt hashing algorithm used in Keystone, which silently limits the size of the password that is hashed to 72 bytes. This creates a false sense of security as any characters beyond the 72-byte limit are ignored during password verification. The default length of application credential secrets is 86 characters, meaning 14 characters of potential complexity are effectively ignored (Red Hat Bugzilla).

Impact

The primary impact of this vulnerability affects data confidentiality and integrity. Organizations relying on password complexity requirements beyond the 72-character limit may have a false sense of security, as additional complexity is ignored during verification (Debian LTS).

Mitigation and workarounds

The vulnerability has been fixed in multiple versions of OpenStack Keystone. The fix includes proper handling of password length limitations and implementation of appropriate warnings when passwords are truncated. Fixed versions include Keystone 23.0.0.0rc1 and various backported patches to stable branches (Launchpad Bug).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management