First published: Tue Mar 29 2022(Updated: )
An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/condor | <=8.6.8~dfsg.1-2 | 8.6.8~dfsg.1-2+deb10u1 |
HTCondor | >=8.8.0<8.8.16 | |
HTCondor | >=9.0.0<9.0.10 | |
HTCondor | >=9.1.0<9.6.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26110 is classified as a high-severity vulnerability due to the potential for user impersonation and unauthorized command execution.
To remediate CVE-2022-26110, users should upgrade HTCondor to version 8.8.16 or later, 9.0.10 or later, or 9.6.0 or later.
CVE-2022-26110 affects HTCondor versions prior to 8.8.16, prior to 9.0.10, and prior to 9.6.0.
The implications of CVE-2022-26110 include the ability for authenticated users to impersonate any entity, potentially leading to unauthorized access and control.
CVE-2022-26110 is not limited to specific operating systems but affects installations of HTCondor across multiple systems including Debian.