Vulnerabilities
Vulnerable Software
Redhat:  >> Ceph Storage For Power  Security Vulnerabilities
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.
CVSS Score
6.5
EPSS Score
0.001
Published
2022-08-25


Contact Us

Shodan ® - All rights reserved