Vulnerability Details : CVE-2014-0592
Barclamp (aka barclamp-network) 1.7 for the Crowbar Framework, as used in SUSE Cloud 3, does not enable netfilter on bridges when creating new instances, which allows remote attackers to bypass security group restrictions via unspecified vectors, related to floating IPs.
Exploit prediction scoring system (EPSS) score for CVE-2014-0592
Probability of exploitation activity in the next 30 days: 0.97%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 81 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0592
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-0592
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0592
-
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00025.html
[security-announce] SUSE-SU-2014:0452-1: important: Security update forPatch;Vendor Advisory
-
https://github.com/crowbar/barclamp-network/pull/269
Enable netfilter on bridges by vuntz · Pull Request #269 · crowbar/barclamp-network · GitHub
-
http://www.securityfocus.com/bid/66519
SUSE Cloud Security Group Handling Security Bypass Vulnerability
-
https://bugzilla.novell.com/show_bug.cgi?id=864183
Bug 864183 – VUL-0: CVE-2014-0592: crowbar-barclamp-network: SUSE Cloud 3 doesn't enforce security groups
Products affected by CVE-2014-0592
- cpe:2.3:a:novell:suse_cloud:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:crowbar:barclamp:1.7:*:*:*:*:*:*:*