CVE-2021-3560

Published Feb 16, 2022

Last updated 5 months ago

Overview

Description
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Source
secalert@redhat.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
7.2
Impact score
10
Exploitability score
3.9
Vector string
AV:L/AC:L/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Red Hat Polkit Incorrect Authorization Vulnerability
Exploit added on
May 12, 2023
Exploit action due
Jun 2, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-754
secalert@redhat.com
CWE-863

Social media

Hype score
Not currently trending

Configurations