CVE-2020-16156
CVE Details
Visit the official vulnerability details page for CVE-2020-16156 to learn more.
Initial Publication
11/13/2024
Last Update
12/12/2024
Third Party Dependency
perl-base
NIST CVE Summary
CPAN 2.28 allows Signature Verification Bypass.
CVE Severity
Our Official Summary
A malicious or compromised CPAN server used by a user, or a man-in-the-middle attacker, could use this flaw to bypass signature verification. The images where this vulnerability is have controls in place are not accessible outside the cluster. So the attacker needs to gain privileged access to the cluster to attempt this exploit. Also the containers do not allow execution of arbitrary code. Impact of this exploit is also low, since container reduces the attack surface.
Status
Ongoing
Affected Products & Versions
Version | Palette Enterprise | Palette Enterprise Airgap | VerteX | VerteX Airgap |
---|---|---|---|---|
4.4.20 | ⚠️ Impacted | ✅ No Impact | ⚠️ Impacted | ✅ No Impact |
Revision History
Date | Revision |
---|---|
12/12/2024 | Official summary added |