First published: Mon Jun 08 2020(Updated: )
It was found that nmcli, a command line interface to NetworkManager did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings, when creating a new profile. When a user connects to a network using this profile, the authentication does not happen and the connection is made insecurely.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME NetworkManager | <1.22.14 | |
GNOME NetworkManager | >=1.24.0<1.24.2 | |
Fedoraproject Fedora | =31 | |
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10754 is a vulnerability in NetworkManager that allows a remote authenticated attacker to bypass security restrictions and make insecure connections.
CVE-2020-10754 affects IBM Security Guardium versions 10.5 to 11.3, allowing for bypassing of security restrictions.
CVE-2020-10754 has a severity rating of 4.3, classified as medium.
To fix CVE-2020-10754 in IBM Security Guardium, upgrade to a version that is not affected by the vulnerability.
Yes, you can find references for CVE-2020-10754 at the following links: [Link 1](https://exchange.xforce.ibmcloud.com/vulnerabilities/184636), [Link 2](https://www.ibm.com/support/pages/node/6455281), [Link 3](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10754).