{"id":"BIT-ceph-2020-10736","details":"An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.","aliases":["CVE-2020-10736"],"modified":"2026-03-20T10:00:18.924475Z","published":"2026-03-20T09:05:27.834Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10736"},{"type":"WEB","url":"https://ceph.io/releases/v15-2-2-octopus-released/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10736"}],"affected":[{"package":{"name":"ceph","ecosystem":"Bitnami","purl":"pkg:bitnami/ceph"},"ranges":[{"type":"SEMVER","events":[{"introduced":"15.2.0"},{"fixed":"15.2.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/ceph/BIT-ceph-2020-10736.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.5"}