Vulnerability DatabaseGHSA-vjg6-93fv-qv64

GHSA-vjg6-93fv-qv64
vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-vjg6-93fv-qv64) affects etcd authentication logging, specifically for users who authenticate using client certificates without passwords. This issue was discovered in etcd versions >= 3.4.0-rc.0 and <= 3.4.9, as well as versions < 3.3.23. The vulnerability was published on August 5, 2020, and has been classified as a logging vulnerability with low severity (GitHub Advisory).

Technical details

The vulnerability relates to insufficient logging information when users with CN-based authentication attempt to authenticate through the Authenticate endpoint. When authentication failures occur for these users, the system logs errors with inadequate details about the failure reason, potentially hampering effective audit log analysis (GitHub Advisory).

Impact

The primary impact of this vulnerability is the potential for misleading or insufficient audit trails when investigating authentication failures for users who rely solely on client certificate-based authentication. This could complicate security auditing and incident response processes (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in etcd versions 3.4.10 and 3.3.23. Users are advised to upgrade to these or later versions to address the logging issue (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management