
Cloud Vulnerability DB
A community-led vulnerabilities database
Inadequate encryption strength vulnerability was identified in mycli version 1.27.0, tracked as CVE-2023-44690. The vulnerability allows attackers to view sensitive information through the /mycli/config.py file. The issue was discovered and publicly disclosed on October 19, 2023, affecting the mycli command-line interface tool (NVD, CVE).
The vulnerability stems from the use of AES ECB (Electronic Codebook) mode for configuration encryption, which is considered cryptographically weak. The issue is specifically located in the config.py file at lines 192 and 270. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network accessibility with no privileges required (NVD, GitHub Issue).
The vulnerability can lead to exposure of sensitive information stored in the configuration. The use of AES ECB mode makes the encryption susceptible to pattern analysis and information leakage due to its lack of diffusion and pattern repetition characteristics (GitHub Issue).
Security researchers recommend updating the encryption implementation to use more secure modes such as AES CBC (Cipher Block Chaining) or AES GCM (Galois/Counter Mode). Additionally, the use of the cryptography.io library is suggested as a secure alternative (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."