A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role. | A flaw was found in OpenStack Keystone. This vulnerability allows remote authenticated users to bypass intended authorization restrictions. This occurs because OpenStack Keystone does not properly handle EC2 (Elastic Compute Cloud) tokens when a user's role has been removed from a tenant. An attacker can leverage a token associated with a removed user role to gain unauthorized access. |
| Title | OpenStack: Keystone EC2-style credentials invalidation issue | Openstack keystone: openstack keystone: authorization bypass via improper ec2 token handling |
| Weaknesses | CWE-639 | |
| CPEs | cpe:/a:redhat:openstack:13 cpe:/a:redhat:openstack:16.2 cpe:/a:redhat:openstack:17.1 cpe:/a:redhat:openstack:18.0 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2012-12-18T01:00:00.000Z
Updated: 2026-04-07T06:55:17.789Z
Reserved: 2012-10-24T00:00:00.000Z
Link: CVE-2012-5571
No data.
Status : Deferred
Published: 2012-12-18T01:55:03.570
Modified: 2026-04-07T07:16:22.450
Link: CVE-2012-5571