Learn about CVE-2018-6185, a vulnerability in Cloudera Navigator Key Trustee KMS versions 5.12 and 5.13 allowing unauthorized remote access to purge and undelete API calls on encryption zone keys. Find mitigation steps and prevention measures.
Cloudera Navigator Key Trustee KMS versions 5.12 and 5.13 have a vulnerability that allows unauthorized remote access to purge and undelete API calls on encryption zone keys.
Understanding CVE-2018-6185
This CVE highlights a security issue in Cloudera Navigator Key Trustee KMS versions 5.12 and 5.13.
What is CVE-2018-6185?
The vulnerability in Cloudera Navigator Key Trustee KMS versions 5.12 and 5.13 allows unauthorized remote access to purge and undelete API calls on encryption zone keys.
The Impact of CVE-2018-6185
The default ACL values in Key Trustee KMS 5.12.0 and 5.13.0 are set to "*", enabling anyone with network access to the Key Trustee KMS and knowledge of an encryption zone key's name to execute these calls, potentially leading to data loss.
Technical Details of CVE-2018-6185
This section delves into the technical aspects of the vulnerability.
Vulnerability Description
Incorrect default ACL values in Cloudera Navigator Key Trustee KMS versions 5.12 and 5.13 allow unauthorized remote access to purge and undelete API calls on encryption zone keys.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability arises from the default ACL values in Key Trustee KMS 5.12.0 and 5.13.0 being set to "*", enabling unauthorized remote access to purge and undelete API calls.
Mitigation and Prevention
Protecting systems from this vulnerability is crucial.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure timely installation of security patches and updates for Cloudera Navigator Key Trustee KMS.