CVE-2023-35845
Anaconda vulnerability analysis and mitigation

Overview

Anaconda 3 2023.03-1-Linux contains a security vulnerability that allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected. The vulnerability was discovered in June 2023 and assigned CVE-2023-35845 (NVD).

Technical details

During installation, Anaconda3 creates numerous world-writable files, including the cacert.pem file used by the python certify module under the pip installation. Since certify provides the trusted root certificate authorities, any manipulation of these files could allow untrusted content to pass through SSL connections via Man-in-the-middle attacks. The vulnerability has been assigned a CVSS v3.1 base score of 4.7 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H (Investigation Blog).

Impact

The primary impact is the potential disruption of TLS certificate validation. If exploited, an attacker could manipulate the cacert.pem file to bypass SSL certificate verification, potentially enabling man-in-the-middle attacks. This could lead to the compromise of secure communications for applications using the affected pip installation (Investigation Blog).

Mitigation and workarounds

As a temporary mitigation, users can strip all 'other' write permissions from their Anaconda3 installation directory after any installation or update by running: 'find $HOME/anaconda3 -type f -perm /0002 -exec chmod o-w {} ;'. Additionally, upgrading the pip package packaged with Anaconda appears to fix the world-writable cacert.pem file issue (Investigation Blog).

Additional resources


SourceThis report was generated using AI

Related Anaconda vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-42969HIGH8.8
  • AnacondaAnaconda
  • cpe:2.3:a:anaconda:anaconda3
NoYesMay 13, 2022
CVE-2022-26526HIGH7.8
  • AnacondaAnaconda
  • cpe:2.3:a:conda:miniconda3
NoYesMar 17, 2022
CVE-2023-35845MEDIUM4.7
  • AnacondaAnaconda
  • cpe:2.3:a:anaconda:anaconda3
NoYesSep 11, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management