{
  "threat_severity" : "Moderate",
  "public_date" : "2021-02-19T19:30:00Z",
  "bugzilla" : {
    "description" : "Satellite: BMC controller credential leak via API",
    "id" : "1930926",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1930926"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-200",
  "details" : [ "A flaw was found in Red Hat Satellite. The BMC interface exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "A flaw was found in Red Hat Satellite. The BMC interface exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." ],
  "statement" : "Red Hat Satellite is vulnerable to the BMC controller credential leak through the compute host API. Red Hat Product Security has rated this flaw as having a security impact of Moderate. Please refer to https://access.redhat.com/security/updates/classification for clarification on the scoring.",
  "acknowledgement" : "This issue was discovered by Evgeni Golov (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.10 for RHEL 7",
    "release_date" : "2021-11-16T00:00:00Z",
    "advisory" : "RHSA-2021:4702",
    "cpe" : "cpe:/a:redhat:satellite:6.10::el7",
    "package" : "satellite-0:6.10.0-3.el7sat"
  }, {
    "product_name" : "Red Hat Satellite 6.10 for RHEL 7",
    "release_date" : "2021-11-16T00:00:00Z",
    "advisory" : "RHSA-2021:4702",
    "cpe" : "cpe:/a:redhat:satellite_capsule:6.10::el7",
    "package" : "satellite-0:6.10.0-3.el7sat"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-20256\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-20256" ],
  "name" : "CVE-2021-20256",
  "csaw" : false
}