First published: Wed May 12 2021(Updated: )
A flaw was found in pki-core 10.10. Older versions are not affected. When the pkispawn command is run in debug mode, admin credentials are stored in the installation log file, which is world readable.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dogtagpki Dogtagpki | >=10.10.0<10.10.6 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Oracle Linux | =8 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.4 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.4 | |
redhat/pki-core | <10.10.6 | 10.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-3551 is high.
CVE-2021-3551 can allow a local attacker to obtain the admin password and gain admin privileges to the Dogtag CA manager.
The affected software versions include Dogtagpki Dogtagpki (10.10.0 to 10.10.6), Fedoraproject Fedora, Oracle Linux, Redhat Enterprise Linux (8.0 and 8.4), and more.
A local attacker can exploit CVE-2021-3551 by retrieving the installation log file containing the stored admin credentials.
Yes, please refer to the reference link for information on the fix for CVE-2021-3551.