{"id":"CVE-2018-1128","details":"It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.","modified":"2026-05-13T12:01:46.461254185Z","published":"2018-07-10T14:29:00.370Z","related":["SUSE-SU-2018:1920-1","SUSE-SU-2018:2193-1","SUSE-SU-2018:2299-1","SUSE-SU-2018:2478-1","SUSE-SU-2018:2775-1","SUSE-SU-2018:2776-1","SUSE-SU-2018:2858-1","SUSE-SU-2018:2862-1","SUSE-SU-2018:2980-1","SUSE-SU-2018:2981-1","SUSE-SU-2018:3961-1","SUSE-SU-2019:0586-1","SUSE-SU-2019:1287-1","openSUSE-SU-2019:1284-1","openSUSE-SU-2024:10676-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"3"}]},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3"}],"cpe":"cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"3"}],"cpe":"cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.0"}]}]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/11/17/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2020/11/17/4"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2177"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2179"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2261"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2274"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4339"},{"type":"REPORT","url":"http://tracker.ceph.com/issues/24836"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575866"},{"type":"FIX","url":"https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ceph/ceph","events":[{"introduced":"0"},{"last_affected":"1d0909a0ace0d739990e3555707f415e61096d9c"},{"last_affected":"bd7989103911796eb5698cf208b0ccdc3370d707"},{"last_affected":"3c9db396aed1f773cbb3441dfb7a21f0b11ab3e1"},{"introduced":"3a9fba20ec743699b69bd0181dd6c54dc01c64b9"},{"last_affected":"5533ecdc0fda920179d7ad84e0aa65a127b20d77"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2"},{"last_affected":"9.0"},{"last_affected":"15.0"},{"introduced":"10.2.0"},{"last_affected":"13.2.1"}],"cpe":["cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*","cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"]}}],"versions":["v15.0.0","v13.2.1","v13.2.0","v14.0.0","v13.1.1","v13.1.0","v13.0.0","v11.0.0","ses2-gm","rrygrvmctuzz-build-me","v0.94.5","v0.94.4","v0.94.3","v0.94","v9.0.0","v0.94.2","v0.94.1","v0.93","v0.19","v0.18","v0.9","v0.7.3","v0.7.2","v0.7.1","v0.6","v0.5","v0.4","v0.2","v0.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1128.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}