CVE-2025-65073: CWE-863 Incorrect Authorization in OpenStack Keystone
OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization.
AI Analysis
Technical Summary
CVE-2025-65073 is a vulnerability classified under CWE-863 (Incorrect Authorization) found in OpenStack Keystone, the identity service component of OpenStack cloud platforms. The flaw exists in versions prior to 26.0.1, 27.0.0, and 28.0.0, where Keystone improperly authorizes requests to the /v3/ec2tokens and /v3/s3tokens endpoints. These endpoints are designed to allow token generation based on AWS Signature authentication, which is intended to provide interoperability with AWS-compatible APIs. However, due to incorrect authorization logic, an attacker possessing a valid AWS Signature can bypass Keystone’s normal authorization checks and obtain tokens with elevated privileges or unauthorized access. This can lead to unauthorized access to cloud resources, privilege escalation, and potential compromise of the cloud environment’s confidentiality and integrity. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting network attack vector, high complexity, no privileges required, no user interaction, and a scope change with partial confidentiality loss and high integrity impact. Although no public exploits are currently known, the vulnerability’s nature and the critical role of Keystone in cloud identity management make it a significant threat. The issue highlights the risks of integrating third-party authentication mechanisms without rigorous authorization validation. OpenStack operators must assess their Keystone versions and configurations to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2025-65073 can be substantial, especially for those relying on OpenStack for private or public cloud infrastructure. Exploitation could allow attackers to impersonate legitimate users or services, gaining unauthorized access to sensitive data and cloud resources. This compromises confidentiality and integrity, potentially leading to data breaches, service disruptions, or unauthorized modifications of cloud workloads. Given Keystone’s central role in identity and access management, a successful attack could cascade, affecting multiple services and tenants in multi-tenant environments. The vulnerability’s network accessibility and lack of required privileges increase the risk of remote exploitation. This is particularly critical for sectors such as finance, healthcare, and government agencies in Europe, where data protection regulations like GDPR impose strict requirements. Additionally, disruption or compromise of cloud services could impact business continuity and trust in cloud providers. Organizations using AWS-compatible APIs with Keystone are especially vulnerable, as attackers can leverage valid AWS signatures to bypass controls.
Mitigation Recommendations
European organizations should immediately verify their OpenStack Keystone versions and upgrade to versions 26.0.1 or later, 27.0.1 or later, or 28.0.1 or later where the vulnerability is patched. If upgrading is not immediately feasible, organizations should implement strict network controls to limit access to Keystone endpoints, especially /v3/ec2tokens and /v3/s3tokens, restricting them to trusted sources only. Review and audit the use of AWS Signature-based authentication within Keystone to ensure it is configured securely and monitored for anomalies. Employ enhanced logging and alerting on token generation requests to detect unusual patterns indicative of exploitation attempts. Conduct regular penetration testing and vulnerability assessments focused on identity services. Additionally, consider implementing multi-factor authentication and role-based access controls to reduce the impact of compromised tokens. Collaborate with cloud service providers to ensure timely patch deployment and share threat intelligence related to this vulnerability. Finally, update incident response plans to include scenarios involving Keystone authorization bypass.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-65073: CWE-863 Incorrect Authorization in OpenStack Keystone
Description
OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization.
AI-Powered Analysis
Technical Analysis
CVE-2025-65073 is a vulnerability classified under CWE-863 (Incorrect Authorization) found in OpenStack Keystone, the identity service component of OpenStack cloud platforms. The flaw exists in versions prior to 26.0.1, 27.0.0, and 28.0.0, where Keystone improperly authorizes requests to the /v3/ec2tokens and /v3/s3tokens endpoints. These endpoints are designed to allow token generation based on AWS Signature authentication, which is intended to provide interoperability with AWS-compatible APIs. However, due to incorrect authorization logic, an attacker possessing a valid AWS Signature can bypass Keystone’s normal authorization checks and obtain tokens with elevated privileges or unauthorized access. This can lead to unauthorized access to cloud resources, privilege escalation, and potential compromise of the cloud environment’s confidentiality and integrity. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting network attack vector, high complexity, no privileges required, no user interaction, and a scope change with partial confidentiality loss and high integrity impact. Although no public exploits are currently known, the vulnerability’s nature and the critical role of Keystone in cloud identity management make it a significant threat. The issue highlights the risks of integrating third-party authentication mechanisms without rigorous authorization validation. OpenStack operators must assess their Keystone versions and configurations to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2025-65073 can be substantial, especially for those relying on OpenStack for private or public cloud infrastructure. Exploitation could allow attackers to impersonate legitimate users or services, gaining unauthorized access to sensitive data and cloud resources. This compromises confidentiality and integrity, potentially leading to data breaches, service disruptions, or unauthorized modifications of cloud workloads. Given Keystone’s central role in identity and access management, a successful attack could cascade, affecting multiple services and tenants in multi-tenant environments. The vulnerability’s network accessibility and lack of required privileges increase the risk of remote exploitation. This is particularly critical for sectors such as finance, healthcare, and government agencies in Europe, where data protection regulations like GDPR impose strict requirements. Additionally, disruption or compromise of cloud services could impact business continuity and trust in cloud providers. Organizations using AWS-compatible APIs with Keystone are especially vulnerable, as attackers can leverage valid AWS signatures to bypass controls.
Mitigation Recommendations
European organizations should immediately verify their OpenStack Keystone versions and upgrade to versions 26.0.1 or later, 27.0.1 or later, or 28.0.1 or later where the vulnerability is patched. If upgrading is not immediately feasible, organizations should implement strict network controls to limit access to Keystone endpoints, especially /v3/ec2tokens and /v3/s3tokens, restricting them to trusted sources only. Review and audit the use of AWS Signature-based authentication within Keystone to ensure it is configured securely and monitored for anomalies. Employ enhanced logging and alerting on token generation requests to detect unusual patterns indicative of exploitation attempts. Conduct regular penetration testing and vulnerability assessments focused on identity services. Additionally, consider implementing multi-factor authentication and role-based access controls to reduce the impact of compromised tokens. Collaborate with cloud service providers to ensure timely patch deployment and share threat intelligence related to this vulnerability. Finally, update incident response plans to include scenarios involving Keystone authorization bypass.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691ad1de77ef4e346a475a5d
Added to database: 11/17/2025, 7:42:22 AM
Last enriched: 11/24/2025, 8:01:48 AM
Last updated: 1/7/2026, 9:23:26 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.