A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| redhat | ceph_storage | - | - |
| redhat | ceph_storage | - | - |
| redhat | ceph_storage | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
15
Affected Products
15
References
redhat / ceph_storage
| - |
| redhat | openshift_container_storage | - | - |
| redhat | openshift_data_foundation | - | - |
| redhat | openstack_platform | - | - |
| redhat | ceph_storage_for_ibm_z_systems | - | - |
| redhat | ceph_storage | - | - |
| redhat | ceph_storage | - | - |
| redhat | ceph_storage_for_power | - | - |
| redhat | ceph_storage | - | - |
| redhat | ceph_storage | - | - |
| redhat | ceph_storage_for_power | - | - |
| fedoraproject | fedora | - | - |
| fedoraproject | fedora | - | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Exploitability
Impact