Skip to main content
Version: latest

CVE-2020-16156

CVE Details

Visit the official vulnerability details page for CVE-2020-16156 to learn more.

Initial Publication

11/13/2024

Last Update

12/12/2024

Third Party Dependency

perl-base

NIST CVE Summary

CPAN 2.28 allows Signature Verification Bypass.

CVE Severity

7.8

Our Official Summary

A malicious or compromised CPAN server used by a user, or a man-in-the-middle attacker, could use this flaw to bypass signature verification. The images where this vulnerability is have controls in place are not accessible outside the cluster. So the attacker needs to gain privileged access to the cluster to attempt this exploit. Also the containers do not allow execution of arbitrary code. Impact of this exploit is also low, since container reduces the attack surface.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.4.20⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
12/12/2024Official summary added