CVE-2018-9057

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-9057
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-9057.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-9057
Aliases
Related
Withdrawn
2024-05-15T05:32:27.628289Z
Published
2018-03-27T18:29:00Z
Modified
2024-02-21T23:41:46.890981Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

aws/resourceawsiamuserlogin_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.

References

Affected packages

Git / github.com/terraform-providers/terraform-provider-aws

Affected ranges

Type
GIT
Repo
https://github.com/terraform-providers/terraform-provider-aws
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4

v1.*

v1.0.0
v1.1.0
v1.10.0
v1.11.0
v1.12.0
v1.2.0
v1.3.0
v1.3.1
v1.4.0
v1.5.0
v1.6.0
v1.7.0
v1.7.1
v1.8.0
v1.9.0