A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T11:06:11.137Z

Reserved: 2020-03-20T00:00:00

Link: CVE-2020-10699

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-15T14:15:19.873

Modified: 2024-11-21T04:55:52.773

Link: CVE-2020-10699

cve-icon Redhat

Severity : Important

Publid Date: 2020-03-23T00:00:00Z

Links: CVE-2020-10699 - Bugzilla

cve-icon OpenCVE Enrichment

No data.