First published: Wed Feb 16 2022(Updated: )
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dogtagpki Dogtagpki | >=10.10.0<10.10.6 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Oracle Linux | =8 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.4 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-3551 is high.
CVE-2021-3551 can allow a local attacker to obtain the admin password and gain admin privileges to the Dogtag CA manager.
The affected software versions include Dogtagpki Dogtagpki (10.10.0 to 10.10.6), Fedoraproject Fedora, Oracle Linux, Redhat Enterprise Linux (8.0 and 8.4), and more.
A local attacker can exploit CVE-2021-3551 by retrieving the installation log file containing the stored admin credentials.
Yes, please refer to the reference link for information on the fix for CVE-2021-3551.