
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-vjg6-93fv-qv64) affects etcd authentication logging, specifically for users who authenticate using client certificates without passwords. This issue was discovered in etcd versions >= 3.4.0-rc.0 and <= 3.4.9, as well as versions < 3.3.23. The vulnerability was published on August 5, 2020, and has been classified as a logging vulnerability with low severity (GitHub Advisory).
The vulnerability relates to insufficient logging information when users with CN-based authentication attempt to authenticate through the Authenticate endpoint. When authentication failures occur for these users, the system logs errors with inadequate details about the failure reason, potentially hampering effective audit log analysis (GitHub Advisory).
The primary impact of this vulnerability is the potential for misleading or insufficient audit trails when investigating authentication failures for users who rely solely on client certificate-based authentication. This could complicate security auditing and incident response processes (GitHub Advisory).
The vulnerability has been patched in etcd versions 3.4.10 and 3.3.23. Users are advised to upgrade to these or later versions to address the logging issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."