CVE-2021-3621
moderate-risk
Published 2021-12-23
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Do I need to act?
-
0.38% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (13)
Affected Vendors
References (7)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1975142
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html
Release Notes
https://sssd.io/release-notes/sssd-2.6.0.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1975142
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html
Release Notes
https://sssd.io/release-notes/sssd-2.6.0.html
48
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
1/34 · Minimal
Exposure
17/34 · Moderate