Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

etcd < 3.3.23, 3.4.x < 3.4.10 Multiple Vulnerabilities

Information

Severity

Severity

Medium

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

etcd is prone to multiple vulnerabilities.

Insight

Insight

The following vulnerabilities exist: - A large slice causes panic in decodeRecord method (CVE-2020-15106) - An entry with large index causes panic in WAL ReadAll method (CVE-2020-15112) - Directories created via os.MkdirAll are not checked for permissions (CVE-2020-15113) - Gateway can include itself as an endpoint resulting in resource exhaustion (CVE-2020-15114) - No minimum password length (CVE-2020-15115) - Gateway TLS authentication only applies to endpoints detected in DNS SRV records (CVE-2020-15136)

Affected Software

Affected Software

etcd prior to version 3.3.23 and 3.4.x prior to 3.4.10.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 3.3.23, 3.4.10 or later.