First published: Fri Jan 21 2022(Updated: )
USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Usbview Project Usbview | <2.2 | |
Canonical Ubuntu Linux | ||
Debian Debian Linux | ||
Gentoo Linux | ||
debian/usbview | 2.0-21-g6fe2f4f-2+deb10u1 2.0-21-g6fe2f4f-2+deb11u1 3.0-3 3.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for USBView is CVE-2022-23220.
The severity of CVE-2022-23220 is high with a CVSS score of 7.8.
USBView versions before 2.2 are affected by CVE-2022-23220.
Some local users (e.g., ones logged in via SSH) can exploit CVE-2022-23220 to execute arbitrary code as root.
No, Ubuntu, Debian, and Gentoo Linux are not vulnerable to CVE-2022-23220.