Vulnerable Systems:
*Eucalyptus Systems Eucalyptus 2.0.3 and prior
Remote attackers can exploit this issue to bypass the authentication mechanism and gain unauthorized access.
Eucalyptus versions prior to 3.0.1 are vulnerable.
Vendor Status:
Vendor as issued an updated vulnerability.