First published: Fri Mar 03 2023(Updated: )
systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
Credit: Iyaad Luqman K cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Systemd Project Systemd | <247 | |
redhat/systemd | <247 | 247 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-26604.
The severity of CVE-2023-26604 is high with a CVSS score of 7.8.
The systemd software version up to exclusive 247 is affected by CVE-2023-26604.
CVE-2023-26604 exploits a local privilege escalation vulnerability in systemd for certain Sudo configurations.
To mitigate CVE-2023-26604, ensure that you are using systemd version 247 or later and monitor and update your Sudo configurations to block the exploit.