A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Dogtagpki
Subscribe
|
Dogtagpki
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Oracle
Subscribe
|
Linux
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Server Update Services For Sap Solutions
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26862 | A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:06.563Z
Reserved: 2021-05-13T00:00:00
Link: CVE-2021-3551
No data.
Status : Modified
Published: 2022-02-16T17:15:11.103
Modified: 2024-11-21T06:21:49.303
Link: CVE-2021-3551
OpenCVE Enrichment
No data.
Weaknesses
EUVD