First published: Wed Jun 22 2016(Updated: )
discovery-debug in Foreman before 6.2 when the ssh service has been enabled on discovered nodes displays the root password in plaintext in the system journal when used to log in, which allows local users with access to the system journal to obtain the root password by reading the system journal, or by clicking Logs on the console.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Network Satellite Server | =6.3 | |
Red Hat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4996 is classified as a high-severity vulnerability due to the exposure of root passwords in plaintext.
To remediate CVE-2016-4996, disable the ssh service on discovered nodes or upgrade to a version of Foreman that is not affected.
Foreman versions prior to 6.2 are affected by CVE-2016-4996.
CVE-2016-4996 allows local users to retrieve the root password from the system journal, potentially compromising system security.
Yes, Red Hat Satellite 6.3 is affected by CVE-2016-4996 if the ssh service is enabled on discovered nodes.