The image build process for the overcloud images in Red Hat OpenStack Platform 8.0 (Liberty) director and Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) director (aka overcloud-full) use a default root password of ROOTPW, which allows attackers to gain access via unspecified vectors.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-1222.html | Vendor Advisory |
https://access.redhat.com/security/vulnerabilities/2359821 | Vendor Advisory |
https://rhn.redhat.com/errata/RHSA-2016-1223.html | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2016-1222.html | Vendor Advisory |
https://access.redhat.com/security/vulnerabilities/2359821 | Vendor Advisory |
https://rhn.redhat.com/errata/RHSA-2016-1223.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-1222.html - Vendor Advisory | |
References | () https://access.redhat.com/security/vulnerabilities/2359821 - Vendor Advisory | |
References | () https://rhn.redhat.com/errata/RHSA-2016-1223.html - Vendor Advisory |
Information
Published : 2016-06-30 16:59
Updated : 2024-11-21 02:52
NVD link : CVE-2016-4474
Mitre link : CVE-2016-4474
CVE.ORG link : CVE-2016-4474
JSON object : View
Products Affected
redhat
- openstack