2024-08-20 12:00:36 +00:00
{
2024-08-21 14:00:36 +00:00
"data_version" : "4.0" ,
2024-08-20 12:00:36 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-8007" ,
2024-08-21 14:00:36 +00:00
"ASSIGNER" : "secalert@redhat.com" ,
"STATE" : "PUBLIC"
2024-08-20 12:00:36 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-08-21 14:00:36 +00:00
"value" : "A flaw was found in the Red Hat OpenStack Platform (RHOSP) director. This vulnerability allows an attacker to deploy potentially compromised container images via disabling TLS certificate verification for registry mirrors, which could enable a man-in-the-middle (MITM) attack."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Improper Certificate Validation" ,
"cweId" : "CWE-295"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Red Hat" ,
"product" : {
"product_data" : [
{
"product_name" : "Red Hat OpenStack Platform 16.1" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
}
]
}
} ,
{
"product_name" : "Red Hat OpenStack Platform 16.2" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat OpenStack Platform 17.1" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://access.redhat.com/security/cve/CVE-2024-8007" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/security/cve/CVE-2024-8007"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2305975" ,
"refsource" : "MISC" ,
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=2305975"
}
]
} ,
"impact" : {
"cvss" : [
{
"attackComplexity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
2024-08-20 12:00:36 +00:00
}
]
}
}