A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to a man-in-the-middle attack (MITM), denial of service, leaking of secrets the remote execution job contains, or other issues that may arise from the attacker's ability to forge an SSH key. This issue does not directly allow unauthorized remote execution on the Satellite, although it can leak secrets that may lead to it.
History

Mon, 12 Aug 2024 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat satellite Capsule
Redhat satellite Utils
CPEs cpe:/a:redhat:satellite:6 cpe:/a:redhat:satellite:6.15::el8
cpe:/a:redhat:satellite_capsule:6.15::el8
cpe:/a:redhat:satellite_utils:6.15::el8
Vendors & Products Redhat satellite Capsule
Redhat satellite Utils
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-05-14T14:27:41.323Z

Updated: 2024-09-16T20:26:01.689Z

Reserved: 2024-05-14T14:03:36.786Z

Link: CVE-2024-4871

cve-icon Vulnrichment

Updated: 2024-08-01T20:55:10.305Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T16:17:37.163

Modified: 2024-08-12T16:15:17.313

Link: CVE-2024-4871

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-14T00:00:00Z

Links: CVE-2024-4871 - Bugzilla