CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
Analysis
When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
Technical Context
An authentication bypass vulnerability allows attackers to circumvent login mechanisms and gain unauthorized access without valid credentials. This vulnerability is classified as Improper Authentication (CWE-287).
Affected Products
Affected products: Canonical Cloud-Init
Remediation
Implement robust authentication mechanisms. Use multi-factor authentication. Review authentication logic for bypass conditions. Remove default credentials.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| mantic | ignored | end of life, was needs-triage |
| upstream | released | 25.1.3 |
| oracular | ignored | end of life, was needed |
| bionic | released | 23.1.2-0ubuntu0~18.04.1+esm1 |
| focal | released | 24.4.1-0ubuntu0~20.04.3+esm1 |
| jammy | released | 25.1.4-0ubuntu0~22.04.1 |
| noble | released | 25.1.4-0ubuntu0~24.04.1 |
| plucky | released | 25.1.4-0ubuntu0~25.04.1 |
| xenial | released | 21.1-19-gbad84ad4-0ubuntu1~16.04.4+esm2 |
| trusty | DNE | - |
Debian
Bug #1108403| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | vulnerable | 20.4.1-2+deb11u1 | - |
| bookworm | fixed | 22.4.2-1+deb12u3 | - |
| trixie | fixed | 25.1.4-1+deb13u1 | - |
| forky, sid | fixed | 25.3-2 | - |
| (unstable) | fixed | 25.1.4-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2024-54707