Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-my73-sc8s-3faj
Summary
etcd Key name can be accessed via LeaseTimeToLive API
### Impact
LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn't have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC).

### Patches
< v3.4.26 and < v3.5.9 are affected.

### Workarounds
No.

### Reporter
Yoni Rozenshein
Aliases
0
alias CVE-2023-32082
1
alias GHSA-3p4g-rcw5-8298
Fixed_packages
0
url pkg:deb/debian/etcd@3.4.30-1?distro=trixie
purl pkg:deb/debian/etcd@3.4.30-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.30-1%3Fdistro=trixie
1
url pkg:deb/debian/etcd@3.5.16-4
purl pkg:deb/debian/etcd@3.5.16-4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.5.16-4
2
url pkg:deb/debian/etcd@3.5.16-4?distro=trixie
purl pkg:deb/debian/etcd@3.5.16-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.5.16-4%3Fdistro=trixie
3
url pkg:deb/debian/etcd@3.5.16-10?distro=trixie
purl pkg:deb/debian/etcd@3.5.16-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.5.16-10%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/etcd@3.3.25%2Bdfsg-6
purl pkg:deb/debian/etcd@3.3.25%2Bdfsg-6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7565-6bvk-mqgx
1
vulnerability VCID-my73-sc8s-3faj
2
vulnerability VCID-pb9m-ts3k-uban
3
vulnerability VCID-ud4m-y2s3-nban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.3.25%252Bdfsg-6
1
url pkg:deb/debian/etcd@3.3.25%2Bdfsg-6?distro=trixie
purl pkg:deb/debian/etcd@3.3.25%2Bdfsg-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7565-6bvk-mqgx
1
vulnerability VCID-my73-sc8s-3faj
2
vulnerability VCID-pb9m-ts3k-uban
3
vulnerability VCID-ud4m-y2s3-nban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.3.25%252Bdfsg-6%3Fdistro=trixie
2
url pkg:deb/debian/etcd@3.4.23-4
purl pkg:deb/debian/etcd@3.4.23-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-my73-sc8s-3faj
1
vulnerability VCID-pb9m-ts3k-uban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-4
3
url pkg:deb/debian/etcd@3.4.23-4?distro=trixie
purl pkg:deb/debian/etcd@3.4.23-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-my73-sc8s-3faj
1
vulnerability VCID-pb9m-ts3k-uban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-4%3Fdistro=trixie
4
url pkg:rpm/redhat/etcd@3.4.26-1?arch=el9ost
purl pkg:rpm/redhat/etcd@3.4.26-1?arch=el9ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-my73-sc8s-3faj
1
vulnerability VCID-pb9m-ts3k-uban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/etcd@3.4.26-1%3Farch=el9ost
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32082.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32082
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47014
published_at 2026-04-21T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46991
published_at 2026-04-02T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.4701
published_at 2026-04-04T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46957
published_at 2026-04-07T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47011
published_at 2026-04-08T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47008
published_at 2026-04-09T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.47033
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.47006
published_at 2026-04-12T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.47013
published_at 2026-04-13T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.4707
published_at 2026-04-16T12:55:00Z
10
value 0.00239
scoring_system epss
scoring_elements 0.47065
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/etcd-io/etcd
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/etcd-io/etcd
5
reference_url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md
6
reference_url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md
7
reference_url https://github.com/etcd-io/etcd/pull/15656
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/pull/15656
8
reference_url https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32082
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-32082
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036295
reference_id 1036295
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036295
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2208131
reference_id 2208131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2208131
12
reference_url https://access.redhat.com/errata/RHSA-2023:3441
reference_id RHSA-2023:3441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3441
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score0.1 - 3.1
Exploitability0.5
Weighted_severity2.8
Risk_score1.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-my73-sc8s-3faj