Description
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8.
Published: 2026-03-11
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The himmelblaud-tasks daemon, which runs as root, creates Kerberos cache files in /tmp/krb5cc_\<uid> without protection against symlink attacks. The removal of PrivateTmp exposes this directory to the host, allowing a local user to create a symlink to an arbitrary file, change its ownership or overwrite it during cache creation. This flaw enables an attacker with local access to gain root privileges on the host. The weakness corresponds to CWE‑59: Improper Restriction of Operations within the Bounds of a Resource.

Affected Systems

himmelblau-idm provides the himmelblau product. Versions prior to 3.1.0 and 2.3.8 of the himmelblaud‑tasks component are vulnerable. Users on these releases should upgrade.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.8 indicating high severity. The EPSS score is below 1 percent, indicating low probability of exploitation in the wild, and it is not listed in the CISA KEV catalog. The attack vector is local with the attacker needing only user-level access to create a symbolic link in /tmp. Once the symlink is in place, the daemon will perform a chown or overwrite on the target during cache generation, which grants system-wide privileges.

Generated by OpenCVE AI on March 17, 2026 at 15:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch that includes version 3.1.0 or 2.3.8 of the himmelblaud-tasks daemon. Check the vendor advisory for any additional steps.

Generated by OpenCVE AI on March 17, 2026 at 15:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:himmelblau-idm:himmelblau:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Himmelblau-idm
Himmelblau-idm himmelblau
Vendors & Products Himmelblau-idm
Himmelblau-idm himmelblau

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8.
Title himmelblaud-tasks: local privilege escalation via /tmp symlink attack on Kerberos ccache
Weaknesses CWE-59
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Himmelblau-idm Himmelblau
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T20:07:29.194Z

Reserved: 2026-03-10T15:40:10.487Z

Link: CVE-2026-31979

cve-icon Vulnrichment

Updated: 2026-03-11T20:07:25.505Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T20:16:17.607

Modified: 2026-03-16T18:18:34.750

Link: CVE-2026-31979

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:55:14Z

Weaknesses