A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to a man-in-the-middle attack (MITM), denial of service, leaking of secrets the remote execution job contains, or other issues that may arise from the attacker's ability to forge an SSH key. This issue does not directly allow unauthorized remote execution on the Satellite, although it can leak secrets that may lead to it.
Metrics
Affected Vendors & Products
References
History
Sun, 24 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 12 Aug 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat satellite Capsule
Redhat satellite Utils |
|
CPEs | cpe:/a:redhat:satellite:6.15::el8 cpe:/a:redhat:satellite_capsule:6.15::el8 cpe:/a:redhat:satellite_utils:6.15::el8 |
|
Vendors & Products |
Redhat satellite Capsule
Redhat satellite Utils |
|
References |
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-05-14T14:27:41.323Z
Updated: 2024-11-24T17:42:16.307Z
Reserved: 2024-05-14T14:03:36.786Z
Link: CVE-2024-4871
Vulnrichment
Updated: 2024-08-01T20:55:10.305Z
NVD
Status : Awaiting Analysis
Published: 2024-05-14T16:17:37.163
Modified: 2024-11-21T09:43:45.893
Link: CVE-2024-4871
Redhat