CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

canonical

cloud-init

9 known vulnerabilities · sorted by CVSS score

CVE-2012-6639
HIGH8.8

An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data.

canonical / cloud-init+5
Network
Published Nov 25, 2019
CVE-2024-6174
HIGH8.8

When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.

canonical / cloud-init
Adjacent
Published Jun 26, 2025
CVE-2018-10896
HIGH7.1

The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks.

canonical / cloud-init
Local
Published Aug 1, 2018
CVE-2024-11584
MEDIUM5.9

cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger hotplug-hook commands.

canonical / cloud-init
Local
Published Jun 26, 2025
CVE-2020-8631
MEDIUM5.5

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.

canonical / cloud-init+2
Local
Published Feb 5, 2020
CVE-2021-3429
MEDIUM5.5

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

canonical / cloud-init
Local
Published Apr 19, 2023
CVE-2022-2084
MEDIUM5.5

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

canonical / cloud-init+4
Local
Published Apr 19, 2023
CVE-2020-8632
MEDIUM5.5

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.

canonical / cloud-init+2
Local
Published Feb 5, 2020
CVE-2023-1786
MEDIUM5.5

Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.

canonical / cloud-init+7
Local
Published Apr 26, 2023