CVE-2025-65073

7.5 HIGH

📋 TL;DR

OpenStack Keystone versions before 26.0.1, 27.0.0, and 28.0.0 contain an authorization bypass vulnerability where AWS Signature authentication can grant Keystone authorization without proper validation. This affects OpenStack deployments using Keystone for identity services, potentially allowing unauthorized access to cloud resources.

💻 Affected Systems

Products:
  • OpenStack Keystone
Versions: All versions before 26.0.1, 27.0.0, and 28.0.0
Operating Systems: All operating systems running OpenStack Keystone
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using Keystone's EC2/S3 token endpoints (/v3/ec2tokens or /v3/s3tokens)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with valid AWS credentials could gain unauthorized administrative access to OpenStack cloud resources, leading to data exfiltration, service disruption, or complete cloud infrastructure compromise.

🟠

Likely Case

Attackers with compromised AWS credentials could access OpenStack resources they shouldn't have permission to, potentially escalating privileges within the cloud environment.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to specific services, though unauthorized access to authorized resources could still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid AWS credentials but no additional Keystone authentication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.0.1, 27.0.0, or 28.0.0

Vendor Advisory: https://www.openwall.com/lists/oss-security/2025/11/04/2

Restart Required: Yes

Instructions:

1. Upgrade Keystone to version 26.0.1, 27.0.0, or 28.0.0. 2. Restart Keystone services. 3. Verify the fix by testing AWS signature authentication.

🔧 Temporary Workarounds

Disable EC2/S3 token endpoints

linux

Temporarily disable vulnerable endpoints until patching is complete

# Configure Keystone to disable /v3/ec2tokens and /v3/s3tokens endpoints
# Edit keystone.conf and remove or comment out relevant endpoint configurations

Network access control

linux

Restrict access to Keystone EC2/S3 token endpoints using firewall rules

iptables -A INPUT -p tcp --dport 5000 -m string --string "/v3/ec2tokens" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 5000 -m string --string "/v3/s3tokens" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Keystone services from untrusted networks
  • Monitor and alert on all authentication attempts to EC2/S3 token endpoints

🔍 How to Verify

Check if Vulnerable:

Check Keystone version: keystone-manage --version. If version is before 26.0.1, 27.0.0, or 28.0.0, system is vulnerable.

Check Version:

keystone-manage --version

Verify Fix Applied:

After upgrade, verify version is 26.0.1, 27.0.0, or 28.0.0 and test that AWS signature authentication now properly validates Keystone authorization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns to /v3/ec2tokens or /v3/s3tokens endpoints
  • Successful authentication from unexpected AWS accounts

Network Indicators:

  • HTTP POST requests to /v3/ec2tokens or /v3/s3tokens with AWS signature headers

SIEM Query:

source="keystone" AND (uri_path="/v3/ec2tokens" OR uri_path="/v3/s3tokens") AND http_method="POST"

🔗 References

📤 Share & Export