Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-3287

Опубликовано: 28 сент. 2022
Источник: debian
EPSS Низкий

Описание

When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
fwupdfixed1.8.5-1package
fwupdnot-affectedbullseyepackage
fwupdnot-affectedbusterpackage

Примечания

  • Introduced by: https://github.com/fwupd/fwupd/commit/1210aa4ae7a8bddfe4d0071736c1285f17136faa (1.7.0)

  • Fixed by: https://github.com/fwupd/fwupd/commit/ea676855f2119e36d433fbd2ed604039f53b2091 (1.8.5)

EPSS

Процентиль: 21%
0.00068
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 3 года назад

When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.

CVSS3: 5.5
redhat
почти 3 года назад

When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.

CVSS3: 6.5
nvd
почти 3 года назад

When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.

CVSS3: 6.5
redos
11 месяцев назад

Уязвимость fwupd

rocky
больше 1 года назад

Moderate: fwupd security update

EPSS

Процентиль: 21%
0.00068
Низкий