
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was discovered in Keystone, identified as CVE-2022-2447, where there exists a time lag (up to one hour in default configuration) between when a security policy indicates a token should be revoked and when it is actually revoked. This vulnerability affects various versions of the Keystone authentication service, including multiple Ubuntu releases and Red Hat OpenStack Platform (NVD, Ubuntu Security).
The vulnerability has a CVSS 3.1 Base Score of 6.6 (Medium), with attack vector being Network-based, high attack complexity, and requiring high privileges. The vulnerability specifically relates to token management in Keystone, where application credentials with short expiration times can issue tokens that remain valid beyond the credentials' expiration period (Ubuntu Security).
This vulnerability could allow a remote administrator to secretly maintain access for longer than expected. When exploited, the flaw enables tokens to remain valid for up to an hour after they should have been revoked, potentially leading to unauthorized access retention (Red Hat Bugzilla).
A fix has been implemented through OpenStack's keystonemiddleware, as evidenced by the patch available at OpenDev review. Several distributions have released fixed versions, including Debian's python-keystonemiddleware package version 10.1.0-4 and later (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."