CVE-2018-9057

aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.
References
Link Resource
https://github.com/terraform-providers/terraform-provider-aws/pull/3934 Issue Tracking Patch Third Party Advisory
https://github.com/terraform-providers/terraform-provider-aws/pull/3934 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hashicorp:terraform:*:*:*:*:*:aws:*:*

History

21 Nov 2024, 04:14

Type Values Removed Values Added
References () https://github.com/terraform-providers/terraform-provider-aws/pull/3934 - Issue Tracking, Patch, Third Party Advisory () https://github.com/terraform-providers/terraform-provider-aws/pull/3934 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2018-03-27 18:29

Updated : 2024-11-21 04:14


NVD link : CVE-2018-9057

Mitre link : CVE-2018-9057

CVE.ORG link : CVE-2018-9057


JSON object : View

Products Affected

hashicorp

  • terraform
CWE
CWE-332

Insufficient Entropy in PRNG