Vulnerability Details CVE-2021-3563
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.7%
CVSS Severity
CVSS v3 Score 7.4
Products affected by CVE-2021-3563
-
cpe:2.3:a:openstack:keystone:-
-
cpe:2.3:a:openstack:keystone:10.0.0
-
cpe:2.3:a:openstack:keystone:10.0.1
-
cpe:2.3:a:openstack:keystone:10.0.2
-
cpe:2.3:a:openstack:keystone:10.0.3
-
cpe:2.3:a:openstack:keystone:11.0.0
-
cpe:2.3:a:openstack:keystone:11.0.1
-
cpe:2.3:a:openstack:keystone:11.0.2
-
cpe:2.3:a:openstack:keystone:11.0.3
-
cpe:2.3:a:openstack:keystone:11.0.4
-
cpe:2.3:a:openstack:keystone:12.0.0
-
cpe:2.3:a:openstack:keystone:12.0.1
-
cpe:2.3:a:openstack:keystone:12.0.2
-
cpe:2.3:a:openstack:keystone:12.0.3
-
cpe:2.3:a:openstack:keystone:13.0.0
-
cpe:2.3:a:openstack:keystone:13.0.1
-
cpe:2.3:a:openstack:keystone:13.0.2
-
cpe:2.3:a:openstack:keystone:14.0.0
-
cpe:2.3:a:openstack:keystone:14.0.1
-
cpe:2.3:a:openstack:keystone:14.1.0
-
cpe:2.3:a:openstack:keystone:15.0.0
-
cpe:2.3:a:openstack:keystone:15.0.1
-
cpe:2.3:a:openstack:keystone:16.0.0
-
cpe:2.3:a:openstack:keystone:16.0.0.0
-
cpe:2.3:a:openstack:keystone:16.0.1
-
cpe:2.3:a:openstack:keystone:16.0.2
-
cpe:2.3:a:openstack:keystone:17.0.0
-
cpe:2.3:a:openstack:keystone:17.0.0.0
-
cpe:2.3:a:openstack:keystone:17.0.1
-
cpe:2.3:a:openstack:keystone:18.0.0
-
cpe:2.3:a:openstack:keystone:18.0.0.0
-
cpe:2.3:a:openstack:keystone:18.0.1
-
cpe:2.3:a:openstack:keystone:19.0.0
-
cpe:2.3:a:openstack:keystone:19.0.0.0
-
cpe:2.3:a:openstack:keystone:19.0.1
-
cpe:2.3:a:openstack:keystone:2012.1
-
cpe:2.3:a:openstack:keystone:2012.1.1
-
cpe:2.3:a:openstack:keystone:2012.1.2
-
cpe:2.3:a:openstack:keystone:2012.1.3
-
cpe:2.3:a:openstack:keystone:2012.2
-
cpe:2.3:a:openstack:keystone:2012.2.1
-
cpe:2.3:a:openstack:keystone:2012.2.2
-
cpe:2.3:a:openstack:keystone:2012.2.3
-
cpe:2.3:a:openstack:keystone:2012.2.4
-
cpe:2.3:a:openstack:keystone:2013
-
cpe:2.3:a:openstack:keystone:2013.1
-
cpe:2.3:a:openstack:keystone:2013.1.1
-
cpe:2.3:a:openstack:keystone:2013.1.2
-
cpe:2.3:a:openstack:keystone:2013.1.3
-
cpe:2.3:a:openstack:keystone:2013.1.4
-
cpe:2.3:a:openstack:keystone:2013.2
-
cpe:2.3:a:openstack:keystone:2013.2.1
-
cpe:2.3:a:openstack:keystone:2013.2.2
-
cpe:2.3:a:openstack:keystone:2013.2.3
-
cpe:2.3:a:openstack:keystone:2013.2.4
-
cpe:2.3:a:openstack:keystone:2014.1
-
cpe:2.3:a:openstack:keystone:2014.1.1
-
cpe:2.3:a:openstack:keystone:2014.1.2
-
cpe:2.3:a:openstack:keystone:2014.1.2.1
-
cpe:2.3:a:openstack:keystone:2014.1.3
-
cpe:2.3:a:openstack:keystone:2014.1.4
-
cpe:2.3:a:openstack:keystone:2014.1.5
-
cpe:2.3:a:openstack:keystone:2014.2
-
cpe:2.3:a:openstack:keystone:2014.2.0
-
cpe:2.3:a:openstack:keystone:2014.2.1
-
cpe:2.3:a:openstack:keystone:2014.2.2
-
cpe:2.3:a:openstack:keystone:2014.2.3
-
cpe:2.3:a:openstack:keystone:2014.2.4
-
cpe:2.3:a:openstack:keystone:2015.1.0
-
cpe:2.3:a:openstack:keystone:2015.1.1
-
cpe:2.3:a:openstack:keystone:2015.1.2
-
cpe:2.3:a:openstack:keystone:2015.1.3
-
cpe:2.3:a:openstack:keystone:2015.1.4
-
cpe:2.3:a:openstack:keystone:8.0.0
-
cpe:2.3:a:openstack:keystone:8.0.1
-
cpe:2.3:a:openstack:keystone:8.0.2
-
cpe:2.3:a:openstack:keystone:8.1.0
-
cpe:2.3:a:openstack:keystone:8.1.2
-
cpe:2.3:a:openstack:keystone:9.0.0
-
cpe:2.3:a:openstack:keystone:9.0.1
-
cpe:2.3:a:openstack:keystone:9.0.2
-
cpe:2.3:a:openstack:keystone:9.1.0
-
cpe:2.3:a:openstack:keystone:9.2.0
-
cpe:2.3:a:openstack:keystone:9.3.0
-
cpe:2.3:a:openstack:keystone:juno-1
-
cpe:2.3:a:openstack:keystone:juno-2
-
cpe:2.3:a:openstack:keystone:juno-3
-
cpe:2.3:a:redhat:openstack_platform:10.0
-
cpe:2.3:a:redhat:openstack_platform:13.0
-
cpe:2.3:a:redhat:openstack_platform:16.1
-
cpe:2.3:a:redhat:openstack_platform:16.2
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:11.0