Use of Hard-coded Cryptographic Key Affecting cloud-init package, versions <0:19.4-1.el8.7


Severity

Recommended
low

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.05% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-CLOUDINIT-1432635
  • published26 Jul 2021
  • disclosed6 Jul 2018

Introduced: 6 Jul 2018

CVE-2018-10896  (opens in a new tab)
CWE-321  (opens in a new tab)

How to fix?

Upgrade RHEL:8 cloud-init to version 0:19.4-1.el8.7 or higher.
This issue was patched in RHSA-2020:3050.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cloud-init package and not the cloud-init package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks.

CVSS Scores

version 3.1