vulnerability
Ubuntu: (CVE-2018-16886): etcd vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Jan 14, 2019 | Jun 26, 2025 | Jun 26, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Jan 14, 2019
Added
Jun 26, 2025
Modified
Jun 26, 2025
Description
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
Solution
no-fix-ubuntu-package
References
- CVE-2018-16886
- https://attackerkb.com/topics/CVE-2018-16886
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886
- URL-https://github.com/etcd-io/etcd/commit/83c051b701d33261eef91a719e4421c81b000ba4
- URL-https://github.com/etcd-io/etcd/commit/99704e2a97e8710da942bdc737417fc9c9a2c03f
- URL-https://github.com/etcd-io/etcd/commit/a9a9466fb8ba11ad7bb6a44d7446fbd072d59887
- URL-https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2
- URL-https://github.com/etcd-io/etcd/pull/10366
- URL-https://github.com/etcd-io/etcd/pull/10386
- URL-https://www.cve.org/CVERecord?id=CVE-2018-16886
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.