erase-install prior to v40.4 commit 2c31239 writes swiftDialog credential output to a hardcoded path /var/tmp/dialog.json. This allows an unauthenticated attacker to intercept admin credentials entered during reinstall/erase operations via creating a named pipe.

Subscriptions

Vendors Products
Grahampugh Subscribe
Erase-install Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:grahampugh:erase-install:*:*:*:*:*:*:*:*

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Grahampugh
Grahampugh erase-install
Vendors & Products Grahampugh
Grahampugh erase-install

Wed, 04 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-732
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Description erase-install prior to v40.4 commit 2c31239 writes swiftDialog credential output to a hardcoded path /var/tmp/dialog.json. This allows an unauthenticated attacker to intercept admin credentials entered during reinstall/erase operations via creating a named pipe.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-04T15:59:22.134Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70342

cve-icon Vulnrichment

Updated: 2026-03-04T15:57:31.772Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T15:16:12.590

Modified: 2026-03-09T17:41:57.843

Link: CVE-2025-70342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-05T09:08:51Z

Weaknesses