CVE-2021-3560
high-risk
Published 2022-02-16
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Do I need to act?
!
10.9% chance of exploitation in next 30 days
EPSS score — higher than 89% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (6)
Affected Vendors
References (9)
Third Party Advisory
http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html
Third Party Advisory
http://packetstormsecurity.com/files/172846/Facebook-Fizz-Denial-Of-Service.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1961710
Third Party Advisory
http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html
Third Party Advisory
http://packetstormsecurity.com/files/172846/Facebook-Fizz-Denial-Of-Service.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1961710
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-...
62
/ 100
high-risk
Severity
24/34 · High
Exploitability
25/34 · High
Exposure
13/34 · Low