
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-46739) was discovered in the CubeFS master component in versions prior to 3.3.1. The vulnerability was identified during a security audit conducted by Ada Logics in collaboration with OSTIF and the CNCF, and was disclosed on January 3, 2024. This vulnerability affects the UserService component of CubeFS, which gets instantiated when starting the master component server (GitHub Advisory).
The vulnerability stems from CubeFS using raw string comparison of passwords in the UserService of the master component, making it susceptible to timing attacks. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) by NIST with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating it is exploitable over the network with high attack complexity, requires no privileges or user interaction, and primarily impacts confidentiality (NVD).
The vulnerability could allow an untrusted attacker to steal user passwords through timing attacks. This poses a significant risk to system security as it could lead to unauthorized access to user accounts and sensitive information (GitHub Advisory).
The vulnerability has been patched in CubeFS version 3.3.1. For impacted users, the only mitigation path is to upgrade to version 3.3.1 or later, as there are no alternative workarounds available (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."