First published: Thu Jul 01 2021(Updated: )
The Windows version of Multipass before 1.7.0 allowed any local process to connect to the localhost TCP control socket to perform mounts from the operating system to a guest, allowing for privilege escalation.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Multipass | <1.7.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3626 has a high severity rating due to the potential for privilege escalation.
To fix CVE-2021-3626, update Multipass to version 1.7.0 or later.
CVE-2021-3626 affects the Windows version of Multipass prior to 1.7.0.
CVE-2021-3626 is a privilege escalation vulnerability allowing local process access to TCP control sockets.
CVE-2021-3626 cannot be exploited remotely as it requires local access to the control socket.