Security restrictions bypass in Ceph

CERT-LatestNews ThreatsCybercrime
Exploit availability: No Description. CWE-285 - Improper Authorization The vulnerability allows a remote attacker to bypass implemented security restrictions. The vulnerability exists due to improper authorization, related to mons & mgrs. A remote attacker can pass specially crafted data to the....