Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23370

Опубликовано: 25 мар. 2026
Источник: redhat
CVSS3: 4.4

Описание

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data set_new_password() hex dumps the entire buffer, which contains plaintext password data, including current and new passwords. Remove the hex dump to avoid leaking credentials.

A flaw was found in the dell-wmi-sysman component of the Linux kernel. This vulnerability occurs because the set_new_password() function incorrectly hex dumps the entire buffer, which includes sensitive plaintext password data. A local attacker could exploit this to disclose user credentials, leading to unauthorized access.

Отчет

This flaw affects Dell systems using the dell-wmi-sysman driver for BIOS password management. The debug hex dump exposes plaintext current and new passwords to kernel logs (dmesg). A local user with access to kernel logs could retrieve BIOS passwords. This is an information disclosure issue rather than code execution.

Меры по смягчению последствий

Restrict access to kernel logs (dmesg) via kernel.dmesg_restrict sysctl setting.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-256
https://bugzilla.redhat.com/show_bug.cgi?id=2451225kernel: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data

4.4 Medium

CVSS3

Связанные уязвимости

ubuntu
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data set_new_password() hex dumps the entire buffer, which contains plaintext password data, including current and new passwords. Remove the hex dump to avoid leaking credentials.

nvd
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data set_new_password() hex dumps the entire buffer, which contains plaintext password data, including current and new passwords. Remove the hex dump to avoid leaking credentials.

CVSS3: 4.4
msrc
8 дней назад

platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data

debian
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: p ...

github
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data set_new_password() hex dumps the entire buffer, which contains plaintext password data, including current and new passwords. Remove the hex dump to avoid leaking credentials.

4.4 Medium

CVSS3

Уязвимость CVE-2026-23370