First published: Fri Jun 24 2022(Updated: )
A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-core | <0:10.5.18-23.el7 | 0:10.5.18-23.el7 |
redhat/pki-core | <0:10.5.18-23.el7_9 | 0:10.5.18-23.el7_9 |
redhat/pki-core | <0:11.3.0-1.el9 | 0:11.3.0-1.el9 |
Pki-core Project Pki-core | <=10.12.4 | |
Redhat Certificate System | =9.0 | |
Redhat Certificate System | =10.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
This flaw is not exposed if directory-based authentication is not enabled. It is not enabled by default.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-2393 is a vulnerability in pki-core that allows a user to get a certificate for another user identity.
CVE-2022-2393 affects pki-core when directory-based authentication is enabled.
The severity of CVE-2022-2393 is high with a CVSS score of 7.6.
An authenticated attacker on the adjacent network can impersonate another user within the scope of the domain.
Update pki-core to version 0:10.5.18-23.el7, 0:10.5.18-23.el7_9, or 0:11.3.0-1.el9 to address the vulnerability.